| e-Signet Suite-Commit Id is: 95aae6cc & Branch Name is:release-1.3.0-ES | ||||||
|---|---|---|---|---|---|---|
Server Component Details Group: io.mosip.kernel, Artifact: kernel-auditmanager-service, version: 1.2.0.1-B2, Commit ID: 20b256a Group: io.mosip.kernel, Artifact: kernel-auth-service, version: 1.2.0.1-B3, Commit ID: 50926c8 Group: io.mosip.biosdk, Artifact: biosdk-services, version: 1.2.0.1-B3, Commit ID: f2a0b59 Group: io.mosip.idrepository, Artifact: credential-service, version: 1.2.0.1, Commit ID: 50926c8 Group: io.mosip.idrepository, Artifact: credential-request-generator, version: 1.2.0.1, Commit ID: 50926c8 Group: io.mosip.datashare, Artifact: data-share-service, version: 1.2.0.1-B1, Commit ID: 1f4c25e Group: io.mosip.authentication, Artifact: authentication-service, version: 1.2.0.1, Commit ID: 86640e4 Group: io.mosip.authentication, Artifact: authentication-internal-service, version: 1.2.0.1, Commit ID: 86640e4 Group: io.mosip.authentication, Artifact: authentication-otp-service, version: 1.2.0.1, Commit ID: 50926c8 Group: io.mosip.idrepository, Artifact: id-repository-identity-service, version: 1.2.0.1, Commit ID: 821bac2 https://api-internal.camdgc-qa2.mosip.net/v1/idgenerator/actuator/info- No Response Group: io.mosip.kernel, Artifact: kernel-keymanager-service, version: 1.2.0.1-SNAPSHOT, Commit ID: b69c2d6 Group: io.mosip.kernel, Artifact: kernel-masterdata-service, version: 1.2.0.1-B2, Commit ID: 20b256a Group: io.mosip.kernel, Artifact: kernel-notification-service, version: 1.2.0.1-B1, Commit ID: 50926c8 Group: io.mosip.kernel, Artifact: kernel-otpmanager-service, version: 1.2.0.1-B1, Commit ID: 50926c8 Group: io.mosip.pms, Artifact: partner-management-service, version: 1.2.0.1-B3-SNAPSHOT, Commit ID: 50926c8 Group: io.mosip.pms, Artifact: policy-management-service, version: 1.2.0.1-B3-SNAPSHOT, Commit ID: 20b256a https://api-internal.camdgc-qa2.mosip.net/v1/syncdata/actuator/info- No Response https://api-internal.camdgc-qa2.mosip.net/idrepository/v1/actuator/info- No Response Group: io.mosip.esignet, Artifact: esignet-service, version: 1.4.1-SNAPSHOT, Commit ID: ab88802 https://api-internal.camdgc-qa2.mosip.net/v1/identity/actuator/info- No Response | ||||||
Server Errors No server errors | ||||||
| Test | # Total | # Passed | # Skipped | # Failed | Time (ms) | |
| SignUpSettings | 1 | 1 | 0 | 0 | 646 | |
| GenerateChallenge | 2 | 2 | 0 | 0 | 695 | |
| VerifyChallenge | 1 | 1 | 0 | 0 | 223 | |
| RegisterUser | 1 | 1 | 0 | 0 | 1,953 | |
| GetRegistrationStatus | 1 | 1 | 0 | 0 | 251 | |
| GenerateChallengeForResetPassword | 2 | 2 | 0 | 0 | 352 | |
| VerifyChallengeForResetPassword | 1 | 1 | 0 | 0 | 488 | |
| ResetPassword | 1 | 1 | 0 | 0 | 1,819 | |
| GetRegistrationStatusForResetPassword | 1 | 1 | 0 | 0 | 158 | |
| GenerateChallengeNegTC | 38 | 38 | 0 | 0 | 4,033 | |
| VerifyChallengeNegTC | 46 | 46 | 0 | 0 | 14,639 | |
| RegisterUserNegTC | 71 | 71 | 0 | 0 | 11,789 | |
| GetRegistrationStatusNegTC | 3 | 3 | 0 | 0 | 320 | |
| GenerateChallengeForResetPasswordNegTC | 10 | 10 | 0 | 0 | 861 | |
| VerifyChallengeForResetPasswordNegTC | 17 | 17 | 0 | 0 | 5,399 | |
| ResetPasswordNegTC | 30 | 30 | 0 | 0 | 4,536 | |
| AddIdentity | 21 | 21 | 0 | 0 | 104,895 | |
| CreatePolicyGroup | 4 | 4 | 0 | 0 | 1,172 | |
| DefinePolicy | 15 | 15 | 0 | 0 | 5,275 | |
| PublishPolicy | 8 | 8 | 0 | 0 | 2,310 | |
| CreatePartner | 8 | 8 | 0 | 0 | 2,317 | |
| UploadCACertificate | 16 | 16 | 0 | 0 | 24,335 | |
| UploadPartnerCertificate | 8 | 8 | 0 | 0 | 24,292 | |
| updatePartnerCertificate | 1 | 1 | 0 | 0 | 106 | |
| RequestAPIKeyForAuthPartner | 6 | 6 | 0 | 0 | 1,029 | |
| ApproveAPIKey | 6 | 6 | 0 | 0 | 940 | |
| UpdatePolicy | 1 | 1 | 0 | 0 | 249 | |
| DeactivatePolicy | 1 | 1 | 0 | 0 | 181 | |
| GenerateMispLK | 3 | 3 | 0 | 0 | 509 | |
| GenerateApiKey | 2 | 2 | 0 | 0 | 1,514 | |
| OIDCClient | 20 | 20 | 0 | 0 | 5,301 | |
| OIDCClientUpdate | 2 | 2 | 0 | 0 | 419 | |
| GetOidcClient | 2 | 2 | 0 | 0 | 204 | |
| SendBindingOtp | 17 | 17 | 0 | 0 | 4,483 | |
| WalletBinding | 33 | 33 | 0 | 0 | 27,591 | |
| OAuthDetailsRequestLinkedConsent | 3 | 3 | 0 | 0 | 406 | |
| GenerateLinkCodeConsent | 2 | 2 | 0 | 0 | 221 | |
| LinkTransactionConsent | 2 | 2 | 0 | 0 | 263 | |
| GetLinkStatusConsent | 2 | 2 | 0 | 0 | 180 | |
| LinkedAuthenticationConsentWla | 2 | 2 | 0 | 0 | 5,190 | |
| LinkAuthorizationConsent | 1 | 1 | 0 | 0 | 220 | |
| LinkAuthorizationCodeConsent | 1 | 1 | 0 | 0 | 115 | |
| GenerateTokenLinkedConsent | 1 | 1 | 0 | 0 | 788 | |
| GetOidcUserInfoLinkedConsent | 1 | 1 | 0 | 0 | 139 | |
| OAuthDetailsRequestLinked | 5 | 5 | 0 | 0 | 654 | |
| GenerateLinkCode | 14 | 14 | 0 | 0 | 1,365 | |
| LinkTransaction | 15 | 15 | 0 | 0 | 1,451 | |
| GetLinkStatus | 21 | 21 | 0 | 0 | 155,962 | |
| LinkedAuthenticationWla | 3 | 2 | 0 | 1 | 7,446 | |
| LinkedAuthorizationConsent | 16 | 16 | 0 | 0 | 1,757 | |
| LinkAuthorizationCode | 16 | 15 | 0 | 1 | 77,959 | |
| GenerateTokenLinked | 3 | 2 | 1 | 0 | 1,458 | |
| GetOidcUserInfoLinked | 3 | 2 | 1 | 0 | 202 | |
| OAuthDetailsRequestNonAuth | 13 | 13 | 0 | 0 | 1,503 | |
| AuthenticateUserNonAuth | 1 | 1 | 0 | 0 | 800 | |
| OAuthDetailsRequestConsent | 4 | 4 | 0 | 0 | 483 | |
| AuthenticateUserConsent | 5 | 5 | 0 | 0 | 5,550 | |
| AuthorizationCodeConsent | 2 | 2 | 0 | 0 | 433 | |
| GenerateTokenConsent | 2 | 2 | 0 | 0 | 1,339 | |
| GetOidcUserInfoConsent | 2 | 2 | 0 | 0 | 214 | |
| OAuthDetailsRequest | 83 | 83 | 0 | 0 | 8,945 | |
| SendOtp | 23 | 23 | 0 | 0 | 3,422 | |
| AuthenticateUser | 27 | 27 | 0 | 0 | 21,165 | |
| AuthorizationCode | 16 | 16 | 0 | 0 | 1,319 | |
| GenerateToken | 31 | 31 | 0 | 0 | 7,547 | |
| GetOidcUserInfo | 2 | 2 | 0 | 0 | 233 | |
| OAuthDetailsRequestVCI | 2 | 2 | 0 | 0 | 257 | |
| AuthenticateUserVCI | 2 | 2 | 0 | 0 | 2,594 | |
| AuthorizationCodeVCI | 2 | 2 | 0 | 0 | 262 | |
| GenerateTokenVCI | 2 | 2 | 0 | 0 | 456 | |
| GetCredential | 2 | 2 | 0 | 0 | 2,110 | |
| OAuthDetailsRequestVCINegTC | 43 | 43 | 0 | 0 | 4,407 | |
| AuthenticateUserVCINegTC | 21 | 21 | 0 | 0 | 25,142 | |
| AuthorizationCodeVCINegTC | 21 | 21 | 0 | 0 | 2,271 | |
| GenerateTokenVCINegTC | 15 | 15 | 0 | 0 | 3,147 | |
| GetCredentialNegTC | 40 | 39 | 0 | 1 | 6,169 | |
| WellKnownVCI | 1 | 1 | 0 | 0 | 81 | |
| OAuthDetailsRequestPassword | 3 | 3 | 0 | 0 | 405 | |
| AuthenticateUserPassword | 3 | 3 | 0 | 0 | 4,198 | |
| AuthorizationCodePassword | 3 | 3 | 0 | 0 | 600 | |
| GenerateTokenPassword | 3 | 3 | 0 | 0 | 1,951 | |
| GetOidcUserInfoPassword | 3 | 3 | 0 | 0 | 303 | |
| OAuthDetailsRequestPasswordNegTC | 3 | 3 | 0 | 0 | 330 | |
| AuthenticateUserPasswordNegTC | 44 | 44 | 0 | 0 | 10,856 | |
| CreateOIDCClient | 32 | 32 | 0 | 0 | 7,823 | |
| UpdateOIDCClient | 29 | 29 | 0 | 0 | 2,531 | |
| CreateOIDCClientV2 | 6 | 6 | 0 | 0 | 1,675 | |
| UpdateOIDCClientV2 | 6 | 6 | 0 | 0 | 702 | |
| OAuthDetailsRequestV2 | 2 | 2 | 0 | 0 | 253 | |
| CreateOIDCClientV2SunBirdRC | 1 | 1 | 0 | 0 | 380 | |
| OAuthDetailsRequestSunBirdRC | 1 | 1 | 0 | 0 | 121 | |
| AuthenticateUserSunBirdRC | 1 | 1 | 0 | 0 | 192 | |
| AuthorizationCodeSunBirdRC | 1 | 1 | 0 | 0 | 98 | |
| GenerateTokenSunBirdRC | 1 | 1 | 0 | 0 | 223 | |
| GetCredentialSunBirdRC | 1 | 1 | 0 | 0 | 4,725 | |
| OAuthDetailsRequestSunBirdRCNegTC | 28 | 28 | 0 | 0 | 2,706 | |
| AuthenticateUserSunBirdRCNegTC | 41 | 41 | 0 | 0 | 4,298 | |
| AuthorizationCodeSunBirdRCNegTC | 9 | 9 | 0 | 0 | 880 | |
| GenerateTokenSunBirdRCNegTC | 6 | 6 | 0 | 0 | 1,023 | |
| GetCredentialSunBirdRCNegTC | 16 | 16 | 0 | 0 | 6,712 | |
| Total | 1,116 | 1,111 | 2 | 3 | 663,894 | |
| Testcase Input |
|---|
| testCaseName=ESignet_SignUpSettings_Valid_smoke_Pos, endPoint=/v1/signup/settings, role=resident, templateFields=null, input={ }, output={ }, inputTemplate=esignet/SignUpSettings/SignUpSettings, outputTemplate=esignet/SignUpSettings/SignUpSettingsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallenge_STransId_Valid_smoke_Pos, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$" }, output={ "status":"SUCCESS" }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/GenerateChallenge/GenerateChallengeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallenge_STransId_With_1stLang_Valid_smoke_Pos, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "locale": "$1STLANG$" }, output={ "status":"SUCCESS" }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/GenerateChallenge/GenerateChallengeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallenge_STransId_smoke_Pos, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:GenerateChallenge_STransId_Valid_smoke_Pos_TransactionID$", "identifier": "$ID:GenerateChallenge_STransId_Valid_smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$" }, output={ "status":"SUCCESS" }, inputTemplate=esignet/VerifyChallenge/VerifyChallenge, outputTemplate=esignet/VerifyChallenge/VerifyChallengeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUser_SName_Valid_smoke_Pos, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallenge_STransId_smoke_Pos_VTransactionID$", "username": "$ID:GenerateChallenge_STransId_Valid_smoke_Pos_PHONE$", "password": "$PASSWORDTOREGISTERUSER$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:GenerateChallenge_STransId_Valid_smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "status":"PENDING" }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/RegisterUser/RegisterUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetRegistrationStatus_Valid_smoke_Pos, endPoint=/v1/signup/registration/status, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallenge_STransId_smoke_Pos_VTransactionID$" }, output={ "status":"PENDING" }, inputTemplate=esignet/GetRegistrationStatus/GetRegistrationStatus, outputTemplate=esignet/GetRegistrationStatus/GetRegistrationStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeForResetPassword_STransId_Valid_smoke_Pos, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$ID:GenerateChallenge_STransId_Valid_smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESET_PASSWORD", "requestTime": "$TIMESTAMP$" }, output={ "status":"SUCCESS" }, inputTemplate=esignet/GenerateChallengeForResetPassword/GenerateChallengeForResetPassword, outputTemplate=esignet/GenerateChallengeForResetPassword/GenerateChallengeForResetPasswordResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeForResetPassword_STransId_With_1stLang_Valid_smoke_Pos, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$ID:GenerateChallenge_STransId_Valid_smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESET_PASSWORD", "requestTime": "$TIMESTAMP$", "locale": "$1STLANG$" }, output={ "status":"SUCCESS" }, inputTemplate=esignet/GenerateChallengeForResetPassword/GenerateChallengeForResetPassword, outputTemplate=esignet/GenerateChallengeForResetPassword/GenerateChallengeForResetPasswordResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeForResetPassword_STransId_smoke_Pos, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:GenerateChallengeForResetPassword_STransId_Valid_smoke_Pos_TransactionID$", "identifier": "$ID:GenerateChallenge_STransId_Valid_smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "challenge2": "ESignet_RegisterUser_SName_Valid_smoke_Pos_$REGISTEREDUSERFULLNAME$", "format2": "base64url-encoded-json", "type2": "KBA", "requestTime": "$TIMESTAMP$" }, output={ "status":"SUCCESS" }, inputTemplate=esignet/VerifyChallengeForResetPassword/VerifyChallengeForResetPassword, outputTemplate=esignet/VerifyChallengeForResetPassword/VerifyChallengeForResetPasswordResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPassword_STransId_Valid_smoke_Pos, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPassword_STransId_smoke_Pos_VTransactionID$", "identifier": "$ID:GenerateChallenge_STransId_Valid_smoke_Pos_PHONE$", "password": "$PASSWORDTORESET$", "requestTime": "$TIMESTAMP$" }, output={ "status":"PENDING" }, inputTemplate=esignet/ResetPassword/ResetPassword, outputTemplate=esignet/ResetPassword/ResetPasswordResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetRegistrationStatus_Valid_smoke_Pos, endPoint=/v1/signup/registration/status, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPassword_STransId_smoke_Pos_VTransactionID$" }, output={ "status":"PENDING" }, inputTemplate=esignet/GetRegistrationStatus/GetRegistrationStatus, outputTemplate=esignet/GetRegistrationStatus/GetRegistrationStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_Empty_Regenerate_Field3_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "regenerateChallenge": "" }, output={ "status":"SUCCESS" }, inputTemplate=esignet/GenerateChallengeNegTC/GenerateChallengeWithRegenField, outputTemplate=esignet/GenerateChallenge/GenerateChallengeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_Empty_purpose_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_Invalid_Locale_Lang_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "requestTime": "$TIMESTAMP$", "purpose": "REGISTRATION", "locale": "dfghdgh" }, output={ "errors": [ { "errorCode": "unsupported_language" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallengeWithLocale, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_Invalid_Regenerate_Field2_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "regenerateChallenge": "sjdk" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateChallengeNegTC/GenerateChallengeWithRegenField, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_Invalid_purpose_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "sdfgsd", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_Missing_CSRF_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$" }, output={ }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=403, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_Missing_purpose_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "$REMOVE$", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_purpose" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_Null_Regenerate_Field3_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "regenerateChallenge": "null" }, output={ "status":"SUCCESS" }, inputTemplate=esignet/GenerateChallengeNegTC/GenerateChallengeWithRegenField, outputTemplate=esignet/GenerateChallenge/GenerateChallengeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_Null_purpose_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "null", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_STransId_Missing_Regenerate_Field_Pos, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "regenerateChallenge": "$REMOVE$" }, output={ "status":"SUCCESS" }, inputTemplate=esignet/GenerateChallengeNegTC/GenerateChallengeWithRegenField, outputTemplate=esignet/GenerateChallenge/GenerateChallengeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_SpaceVal_Regenerate_Field3_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "regenerateChallenge": " " }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateChallengeNegTC/GenerateChallengeWithRegenField, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_SpaceVal_purpose_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": " ", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_True_Regenerate_Field_Immediately_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:GenerateChallengeNegTC_STransId_Missing_Regenerate_Field_Pos_TransactionID$", "identifier": "$ID:GenerateChallengeNegTC_STransId_Missing_Regenerate_Field_Pos_PHONE$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "regenerateChallenge": "true" }, output={ "errors": [ { "errorCode": "too_early_attempt" } ] }, inputTemplate=esignet/GenerateChallengeNegTC/GenerateChallengeWithTransID, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_True_Regenerate_Field_With_Expired_TransactionID_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "mifw7MnFkxYidmJ1u4jJKGi0XuJVsS-NQGgILa_8kSM", "identifier": "$ID:GenerateChallengeNegTC_STransId_Missing_Regenerate_Field_Pos_PHONE$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "regenerateChallenge": "true" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/GenerateChallengeNegTC/GenerateChallengeWithTransID, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_True_Regenerate_Field_With_Invalid_TransactionID_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "adsfadag", "identifier": "$ID:GenerateChallengeNegTC_STransId_Missing_Regenerate_Field_Pos_PHONE$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "regenerateChallenge": "true" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/GenerateChallengeNegTC/GenerateChallengeWithTransID, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_Valid_Regenerate_Field1_Pos, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "regenerateChallenge": "false" }, output={ "status":"SUCCESS" }, inputTemplate=esignet/GenerateChallengeNegTC/GenerateChallengeWithRegenField, outputTemplate=esignet/GenerateChallenge/GenerateChallengeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_Valid_Regenerate_Field_WO_TransactionID_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "regenerateChallenge": "true" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/GenerateChallengeNegTC/GenerateChallengeWithRegenField, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_With_Empty_Request, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$REMOVE$", "captchaToken": "$REMOVE$", "purpose": "$REMOVE$", "requestTime": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_request,invalid_identifier, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_With_Only_identifier, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "$REMOVE$", "purpose": "$REMOVE$", "requestTime": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_request,invalid_purpose, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_With_all_zeros_in_identifier, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "+000000000", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_With_char_alphabets_in_identifier, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "+85556sig8924", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_With_char_numbers_in_identifier, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "+85556$%8924", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_With_empty_identifier, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_With_empty_string_identifier, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": " ", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_With_space_in_identifier, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "+8555 6898924", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_With_space_in_identifier_field, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "+ 855 56738924", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_Without_CountryCode_in_identifier, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "56768924", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_for_already_registered_mobile_number, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "+85556738924", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$" }, output={ "status":"SUCCESS" }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/GenerateChallenge/GenerateChallengeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_only_with_requestTime, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$REMOVE$", "captchaToken": "$REMOVE$", "purpose": "$REMOVE$", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_purpose,invalid_identifier, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_with_Empty_captcha_token, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$REMOVE$", "captchaToken": " ", "purpose": "$REMOVE$", "requestTime": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_request,invalid_identifier, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_with_Empty_string_captcha_token, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$REMOVE$", "captchaToken": " ", "purpose": "$REMOVE$", "requestTime": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_request,invalid_identifier, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_with_INVALID_requestTime, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "requestinvalid" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_with_Invalid_requestTime_Format, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "2023/11/03 11:03:29.296Z" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_with_Number_in_requestTime, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "12636478" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_with_invalid_captcha_token, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$REMOVE$", "captchaToken": "@3664748hgdh", "purpose": "$REMOVE$", "requestTime": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_request,invalid_identifier, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_with_only_captcha_token, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$REMOVE$", "captchaToken": "", "purpose": "$REMOVE$", "requestTime": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_identifier,invalid_request, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_without_requestTime, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeNegTC_without_requestTime_SPACE, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": " " }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateChallenge/GenerateChallenge, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_AllZero_Identifier_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_AllZero_Identifier_Neg_TransactionID$", "identifier": "+00000000000", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_identifier" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_AlphaNum_Challenge_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_AlphaNum_Challenge_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_AlphaNum_Challenge_Neg_PHONE$", "challenge": "682ghy", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "challenge_failed" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Alphabet_Challenge_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Alphabet_Challenge_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Alphabet_Challenge_Neg_PHONE$", "challenge": "ggfhas", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "challenge_failed" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Alphabet_Identifier_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Alphabet_Identifier_Neg_TransactionID$", "identifier": "+85556sig8924", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_identifier" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_DiffUser_Identifier_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_DiffUser_Identifier_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Missing_CSRF_Neg_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "identifier_mismatch" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_DiffUser_TransactionId_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Missing_CSRF_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_DiffUser_TransactionId_Neg_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "identifier_mismatch" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Diff_Challenge_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Diff_Challenge_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Diff_Challenge_Neg_PHONE$", "challenge": "000000", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "challenge_failed" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Empty_ChallengeInfo_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Empty_ChallengeInfo_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Empty_ChallengeInfo_Neg_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge_info" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTCEmptyChallengeInfo, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_challenge,invalid_challenge_format, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Empty_Challenge_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Empty_Challenge_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Empty_Challenge_Neg_PHONE$", "challenge": "", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Empty_Format_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Empty_Format_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Empty_Format_Neg_PHONE$", "challenge": "111111", "format": "", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Empty_Identifier_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Empty_Identifier_Neg_TransactionID$", "identifier": "", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_identifier" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Empty_RequestTime_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Empty_RequestTime_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Empty_RequestTime_Neg_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Empty_Request_Body_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Empty_Request_Body_Neg_TransactionID$", "identifier": "$REMOVE$", "challenge": "$REMOVE$", "format": "$REMOVE$", "type": "$REMOVE$", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTCEmptyReq, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_identifier,invalid_challenge_info, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Expired_TransactionId_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "38JYeQCqEldh28iZTT2tjuM6HK3qzr-KQzP8G25w5n0", "identifier": "$ID:VerifyChallengeNegTC_STransId_Expired_TransactionId_Neg_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_transaction" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_ExtraDigit_Challenge_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_ExtraDigit_Challenge_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_ExtraDigit_Challenge_Neg_PHONE$", "challenge": "11111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "challenge_failed" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_For_Pos_Sce_2, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_2_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_2_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "status":"SUCCESS", "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_For_Pos_Sce_3, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_3_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_3_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "status":"SUCCESS", "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_For_Pos_Sce_4, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_4_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_4_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "status":"SUCCESS", "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_For_Pos_Sce_5, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_5_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_5_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "status":"SUCCESS", "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_For_Pos_Sce_6, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_6_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_6_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "status":"SUCCESS", "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_For_Pos_Sce_7, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_7_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_7_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "status":"SUCCESS", "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Invalid_Challenge_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Invalid_Challenge_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Invalid_Challenge_Neg_PHONE$", "challenge": "682643", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "challenge_failed" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Invalid_Format_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Invalid_Format_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Invalid_Format_Neg_PHONE$", "challenge": "111111", "format": "ghah haag", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Invalid_Format_RequestTime_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Invalid_Format_RequestTime_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Invalid_Format_RequestTime_Neg_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "2023/11/03 11:03:29.296Z", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Invalid_Num_RequestTime_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Invalid_Num_RequestTime_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Invalid_Num_RequestTime_Neg_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "762537232", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Invalid_RequestTime_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Invalid_RequestTime_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Invalid_RequestTime_Neg_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "requestinvalid", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Invalid_TransactionId_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "kjsndfjksd", "identifier": "$ID:VerifyChallengeNegTC_STransId_Invalid_TransactionId_Neg_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_transaction" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_LessDigit_Challenge_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_LessDigit_Challenge_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_LessDigit_Challenge_Neg_PHONE$", "challenge": "11111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "challenge_failed" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Missing_CSRF_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Missing_CSRF_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Missing_CSRF_Neg_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=403, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Missing_ChallengeInfo_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Missing_ChallengeInfo_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Missing_ChallengeInfo_Neg_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge_info" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTCWOChallengeInfo, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Missing_Challenge_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Missing_Challenge_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Missing_Challenge_Neg_PHONE$", "challenge": "$REMOVE$", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Missing_Format_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Missing_Format_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Missing_Format_Neg_PHONE$", "challenge": "111111", "format": "$REMOVE$", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Missing_Identifier_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Missing_Identifier_Neg_TransactionID$", "identifier": "$REMOVE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_identifier" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Missing_ReqBody_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Missing_ReqBody_Neg_TransactionID$", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTCWOReqBody, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Missing_TransactionId_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$REMOVE$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Missing_TransactionId_Neg_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_transaction" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=400, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Numeric_Format_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Numeric_Format_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Numeric_Format_Neg_PHONE$", "challenge": "111111", "format": "numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_RandomVal_Format_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_RandomVal_Format_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_RandomVal_Format_Neg_PHONE$", "challenge": "111111", "format": "ahja1897", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Registered_User_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Registered_User_Neg_TransactionID$", "identifier": "$ID:GenerateChallenge_STransId_Valid_smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$ID:GenerateChallenge_STransId_Valid_smoke_Pos_PHONE$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "identifier_already_registered" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_SpaceVal_Challenge_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_SpaceVal_Challenge_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_SpaceVal_Challenge_Neg_PHONE$", "challenge": " ", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_SpaceVal_Format_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_SpaceVal_Format_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_SpaceVal_Format_Neg_PHONE$", "challenge": "111111", "format": " ", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_SpaceVal_Identifier_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_SpaceVal_Identifier_Neg_TransactionID$", "identifier": " ", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_identifier" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_SpaceVal_RequestTime_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_SpaceVal_RequestTime_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_SpaceVal_RequestTime_Neg_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": " ", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_SpecialChar_Challenge_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_SpecialChar_Challenge_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_SpecialChar_Challenge_Neg_PHONE$", "challenge": "#$%#%^", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "challenge_failed" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_SpecialChar_Format_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_SpecialChar_Format_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_SpecialChar_Format_Neg_PHONE$", "challenge": "111111", "format": "^^&*&^&", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_SpecialChar_Identifier_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_SpecialChar_Identifier_Neg_TransactionID$", "identifier": "+85556$%8924", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_identifier" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeNegTC_STransId_Valid_Smoke_Pos, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$PHONENUMBERFROMREGEXFORSIGNUP$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallenge/GenerateChallenge", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "status":"SUCCESS", "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallenge/GenerateChallengeResult" } }, inputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTC, outputTemplate=esignet/VerifyChallengeNegTC/VerifyChallengeNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_AlphaNum_Value_On_Name_Field_Neg, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_6_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_6_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_6_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_fullname" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_Empty_Value_On_Language_Field_Neg, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "unsupported_language" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=unsupported_language,invalid_fullname, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_Empty_Value_On_Name_Field_Neg, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_value" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_value,invalid_fullname, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_Exceeding_Limit_Value_On_Name_Field_Neg, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_7_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_7_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_7_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_fullname" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_Invalid_Value_On_Language_Field_Neg, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "unsupported_language" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_fullname,unsupported_language, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_Missing_CSRF_Neg, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "status":"PENDING" }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/RegisterUser/RegisterUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=403, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_Only_1st_Lang_On_Name_Field_Neg, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_3_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_3_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_3_PHONE$", "preferredLang": "khm" }, output={ "status":"PENDING" }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/RegisterUser/RegisterUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_Only_Language_On_Name_Field_Neg, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_value" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_fullname,invalid_value, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_Only_Num_Value_On_Name_Field_Neg, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_5_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_5_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_5_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_fullname" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_Only_SpecialChar_On_Name_Field_Neg, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_4_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_4_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_4_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_fullname" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_Only_Value_On_Name_Field_Neg, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "unknown_error" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_SName_Valid_smoke_Pos, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "status":"PENDING" }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/RegisterUser/RegisterUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_Space_Value_On_Name_Field_Neg, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_value" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_fullname,invalid_value, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_Valid_smoke_2nd_time_Neg, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_EMPTY_string_username, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": " ", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_username", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_EMPTY_username, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_username", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_ONLY_Special_char_consent, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "&^*&^%&*", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_consent", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_ONLY_number_in_consent, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "887765543", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_consent", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH__phone_empty, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_phone_number", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH__phone_empty_string, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": " ", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_phone_number", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_agree_in_consent, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "agree", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_consent", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_all_zero_in_phone, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "+00000000000", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_username", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_alpha_numeric_in_consent, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "8877@@assf65543", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_consent", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_alphanumeric_in_phone, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "+855@ddd37890", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_username", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_different_alpha_consent, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "HJTDE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_consent", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_different_country_code, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "+97634567890", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_username", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_different_name_username, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "b@@124and@@a", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_username", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_different_phone_empty_string, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "+85587437890", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "identifier_mismatch", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_disagree_consent, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "DISAGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "consent_required", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_empty_array_fullName, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$REMOVE$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_fullname", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_empty_consent, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_consent", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_consent,invalid_consent, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_empty_string_consent, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": " ", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_consent,invalid_consent, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_empty_user_info, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$REMOVE$", "requestTime": "$TIMESTAMP$", "phone": "$REMOVE$", "preferredLang": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_fullname,invalid_phone_number, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_less_then_8digit_number, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "+855345678", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_phone_number", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_more_then_20_digit_in_password, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "gjgdjjbj$^&^%&*JKHFDHJ(*9897656665gBVbvnbf", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_password", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_more_then_9digit_number, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "+855345678909876", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_phone_number", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_only_alphabet_in_phone, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_password", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_spaces_in_password, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": " ", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_password", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_spaces_in_username, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "+8550057 67672", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_username", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_spaces_in_username_and_after_plus, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "+ 8550057 67672", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_username", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_special_char_in_phone, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "%^%&&(^$$@&", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_username", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITH_starting_zero_in_phone, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "+85500567890", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_username", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITHout_CONSENT, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "$REMOVE$", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_consent", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITHout__special_character_in_password, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "^%&^%&^^%^&%^%", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_password", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITHout_country_code, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "34567890", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_phone_number", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITHout_country_code_in_username, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "5005767672", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_username", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITHout_fullName, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$REMOVE$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_fullname", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITHout_password, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$REMOVE$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_password", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITHout_phone, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$REMOVE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_phone_number", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITHout_plus_country_code, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "85534567890", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_phone_number", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITHout_preferredLang, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "$REMOVE$" }, output={ "errors": [ { "errorCode": "unsupported_language", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITHout_userInfo, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$REMOVE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$REMOVE$", "requestTime": "$TIMESTAMP$", "phone": "$REMOVE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_fullname", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_username,invalid_fullname,invalid_phone_number, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_WITHout_username, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$REMOVE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_username", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC__with_empty_string_requestTime, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": " ", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_by_different_country_code, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "+98734567890", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_phone_number", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_empty_requestTime, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_invalid_headerTransactionID, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "@374tg4grh", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_with_empty_preferredLang, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "" }, output={ "errors": [ { "errorCode": "unsupported_language", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_with_empty_string_preferredLang, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": " " }, output={ "errors": [ { "errorCode": "unsupported_language", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_with_invalid_preferredLang, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "hgs" }, output={ "errors": [ { "errorCode": "unsupported_language", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_with_invalid_requestTime, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "requestInvalid", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_with_invalid_requestTime_format, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "2023/11/03 11:03:29.296Z", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_with_khm_preferredLang, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_2_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_2_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_For_Pos_Sce_2_PHONE$", "preferredLang": "khm" }, output={ "status":"PENDING" }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/RegisterUser/RegisterUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_with_number_as_requestTime, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "2536373738", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_with_phone_starts_with_zero, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "+85500567890", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_phone_number", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_with_phone_with_all_zero, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "+00000000000", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_phone_number", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_value,invalid_phone_number, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_with_phone_with_alpha_numeric, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "+5767hghjg", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_phone_number", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_with_phone_with_special_char, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "^%$&^%&^%&%", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_phone_number", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_value,invalid_phone_number, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_with_unsupported_preferredLang, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_VTransactionID$", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "ara" }, output={ "errors": [ { "errorCode": "unsupported_language", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_without_headerTransactionID, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "", "username": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDFORAUTHENTICATION$", "consent": "AGREE", "fullName": "$FULLNAMETOREGISTERUSER$", "requestTime": "$TIMESTAMP$", "phone": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "preferredLang": "khm" }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_RegisterUserNegTC_without_request_Object, endPoint=/v1/signup/registration/register, role=resident, templateFields=null, input={ "verifiedTransactionID": "$REMOVE$", "username": "$REMOVE$", "password": "$REMOVE$", "consent": "$REMOVE$", "fullName": "$REMOVE$", "requestTime": "$TIMESTAMP$", "phone": "$REMOVE$", "preferredLang": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_username", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/RegisterUser/RegisterUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_fullname,invalid_password,invalid_consent,invalid_username,invalid_phone_number,unsupported_language, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetRegistrationStatusNegTC_with_expired_TransactionID_wait, endPoint=/v1/signup/registration/status, role=resident, templateFields=null, input={ "verifiedTransactionID": "c6HmSfLCj-GK6VfozWbJA0ox4CrMfQZ9Ln8jkBequCg" }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetRegistrationStatus/GetRegistrationStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetRegistrationStatusNegTC_with_invalid_TransactionID, endPoint=/v1/signup/registration/status, role=resident, templateFields=null, input={ "verifiedTransactionID": "@363gssh" }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetRegistrationStatus/GetRegistrationStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetRegistrationStatusNegTC_without_TransactionID, endPoint=/v1/signup/registration/status, role=resident, templateFields=null, input={ "verifiedTransactionID": "" }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetRegistrationStatus/GetRegistrationStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeForResetPasswordNegTC_Empty_Purpose_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeForResetPasswordNegTC_Invalid_Purpose2_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "reset_password", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeForResetPasswordNegTC_Invalid_Purpose3_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "resetpassword", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeForResetPasswordNegTC_Invalid_Purpose4_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESET_PWD", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeForResetPasswordNegTC_Invalid_Purpose5_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RE_SET_PASSWORD", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeForResetPasswordNegTC_Invalid_Purpose6_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "SET_PASSWORD", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeForResetPasswordNegTC_Invalid_Purpose7_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "SET_PWD", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeForResetPasswordNegTC_Invalid_Purpose8_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "REGISTRATION,RESET_PASSWORD", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeForResetPasswordNegTC_Invalid_Purpose_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESETPASSWORD", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateChallengeForResetPasswordNegTC_SpaceVal_Purpose_Neg, endPoint=/v1/signup/registration/generate-challenge, role=resident, templateFields=null, input={ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": " ", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeForResetPasswordNegTC_STransId_Empty_Challenge2_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_Empty_Challenge2_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "challenge2": "", "format2": "base64url-encoded-json", "type2": "KBA", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESET_PASSWORD", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTCResult" } }, inputTemplate=esignet/VerifyChallengeForResetPasswordNegTC/VerifyChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeForResetPasswordNegTC_STransId_Empty_Format2_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_Empty_Format2_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "challenge2": "ESignet_RegisterUserNegTC_SName_Valid_smoke_Pos_$REGISTEREDUSERFULLNAME$", "format2": "", "type2": "KBA", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESET_PASSWORD", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTCResult" } }, inputTemplate=esignet/VerifyChallengeForResetPasswordNegTC/VerifyChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeForResetPasswordNegTC_STransId_Empty_Type2_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_Empty_Type2_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "challenge2": "ESignet_RegisterUserNegTC_SName_Valid_smoke_Pos_$REGISTEREDUSERFULLNAME$", "format2": "base64url-encoded-json", "type2": "", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESET_PASSWORD", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge_type" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTCResult" } }, inputTemplate=esignet/VerifyChallengeForResetPasswordNegTC/VerifyChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeForResetPasswordNegTC_STransId_Invalid_Challenge2_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_Invalid_Challenge2_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "challenge2": "sdfsdz", "format2": "base64url-encoded-json", "type2": "KBA", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESET_PASSWORD", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_KBA_challenge" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTCResult" } }, inputTemplate=esignet/VerifyChallengeForResetPasswordNegTC/VerifyChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeForResetPasswordNegTC_STransId_Invalid_Format2_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_Invalid_Format2_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "challenge2": "ESignet_RegisterUserNegTC_SName_Valid_smoke_Pos_$REGISTEREDUSERFULLNAME$", "format2": "dssdgdf", "type2": "KBA", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESET_PASSWORD", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTCResult" } }, inputTemplate=esignet/VerifyChallengeForResetPasswordNegTC/VerifyChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeForResetPasswordNegTC_STransId_Invalid_Type2_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_Invalid_Type2_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "challenge2": "ESignet_RegisterUserNegTC_SName_Valid_smoke_Pos_$REGISTEREDUSERFULLNAME$", "format2": "base64url-encoded-json", "type2": "fghf", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESET_PASSWORD", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge_type" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTCResult" } }, inputTemplate=esignet/VerifyChallengeForResetPasswordNegTC/VerifyChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeForResetPasswordNegTC_STransId_Missing_Challenge2_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_Missing_Challenge2_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "challenge2": "$REMOVE$", "format2": "base64url-encoded-json", "type2": "KBA", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESET_PASSWORD", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTCResult" } }, inputTemplate=esignet/VerifyChallengeForResetPasswordNegTC/VerifyChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeForResetPasswordNegTC_STransId_Missing_Format2_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_Missing_Format2_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "challenge2": "ESignet_RegisterUserNegTC_SName_Valid_smoke_Pos_$REGISTEREDUSERFULLNAME$", "format2": "$REMOVE$", "type2": "KBA", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESET_PASSWORD", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTCResult" } }, inputTemplate=esignet/VerifyChallengeForResetPasswordNegTC/VerifyChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeForResetPasswordNegTC_STransId_Missing_Type2_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_Missing_Type2_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "challenge2": "ESignet_RegisterUserNegTC_SName_Valid_smoke_Pos_$REGISTEREDUSERFULLNAME$", "format2": "base64url-encoded-json", "type2": "$REMOVE$", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESET_PASSWORD", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge_type" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTCResult" } }, inputTemplate=esignet/VerifyChallengeForResetPasswordNegTC/VerifyChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeForResetPasswordNegTC_STransId_Null_Challenge2_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_Null_Challenge2_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "challenge2": "null", "format2": "base64url-encoded-json", "type2": "KBA", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESET_PASSWORD", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_KBA_challenge" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTCResult" } }, inputTemplate=esignet/VerifyChallengeForResetPasswordNegTC/VerifyChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeForResetPasswordNegTC_STransId_Null_Format2_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_Null_Format2_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "challenge2": "ESignet_RegisterUserNegTC_SName_Valid_smoke_Pos_$REGISTEREDUSERFULLNAME$", "format2": "null", "type2": "KBA", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESET_PASSWORD", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTCResult" } }, inputTemplate=esignet/VerifyChallengeForResetPasswordNegTC/VerifyChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeForResetPasswordNegTC_STransId_Null_Type2_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_Null_Type2_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "challenge2": "ESignet_RegisterUserNegTC_SName_Valid_smoke_Pos_$REGISTEREDUSERFULLNAME$", "format2": "base64url-encoded-json", "type2": "null", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESET_PASSWORD", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge_type" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTCResult" } }, inputTemplate=esignet/VerifyChallengeForResetPasswordNegTC/VerifyChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeForResetPasswordNegTC_STransId_Purpose_As_Registration_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_Purpose_As_Registration_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "challenge2": "ESignet_RegisterUserNegTC_SName_Valid_smoke_Pos_$REGISTEREDUSERFULLNAME$", "format2": "base64url-encoded-json", "type2": "KBA", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "REGISTRATION", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "identifier_already_registered" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTCResult" } }, inputTemplate=esignet/VerifyChallengeForResetPasswordNegTC/VerifyChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeForResetPasswordNegTC_STransId_SpaceVal_Challenge2_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_SpaceVal_Challenge2_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "challenge2": " ", "format2": "base64url-encoded-json", "type2": "KBA", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESET_PASSWORD", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTCResult" } }, inputTemplate=esignet/VerifyChallengeForResetPasswordNegTC/VerifyChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeForResetPasswordNegTC_STransId_SpaceVal_Format2_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_SpaceVal_Format2_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "challenge2": "ESignet_RegisterUserNegTC_SName_Valid_smoke_Pos_$REGISTEREDUSERFULLNAME$", "format2": " ", "type2": "KBA", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESET_PASSWORD", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTCResult" } }, inputTemplate=esignet/VerifyChallengeForResetPasswordNegTC/VerifyChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeForResetPasswordNegTC_STransId_SpaceVal_Type2_Neg, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_SpaceVal_Type2_Neg_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "challenge2": "ESignet_RegisterUserNegTC_SName_Valid_smoke_Pos_$REGISTEREDUSERFULLNAME$", "format2": "base64url-encoded-json", "type2": " ", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESET_PASSWORD", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "errors": [ { "errorCode": "invalid_challenge_type" } ], "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTCResult" } }, inputTemplate=esignet/VerifyChallengeForResetPasswordNegTC/VerifyChallengeForResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos, endPoint=/v1/signup/registration/verify-challenge, role=resident, templateFields=null, input={ "headerTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_TransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "challenge": "111111", "format": "alpha-numeric", "type": "OTP", "challenge2": "ESignet_RegisterUserNegTC_SName_Valid_smoke_Pos_$REGISTEREDUSERFULLNAME$", "format2": "base64url-encoded-json", "type2": "KBA", "requestTime": "$TIMESTAMP$", "sendOtp":{ "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "captchaToken": "", "purpose": "RESET_PASSWORD", "requestTime": "$TIMESTAMP$", "sendOtpReqTemplate": "esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTC", "sendOtpEndPoint": "/v1/signup/registration/generate-challenge" } }, output={ "status":"SUCCESS", "sendOtpResp":{ "status":"SUCCESS", "sendOtpResTemplate":"esignet/GenerateChallengeForResetPasswordNegTC/GenerateChallengeForResetPasswordNegTCResult" } }, inputTemplate=esignet/VerifyChallengeForResetPasswordNegTC/VerifyChallengeForResetPasswordNegTC, outputTemplate=esignet/VerifyChallengeForResetPasswordNegTC/VerifyChallengeForResetPasswordNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_All_Zero_Identifier_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "+00000000000", "password": "$PASSWORDTORESET$", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Empty_Identifier_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "", "password": "$PASSWORDTORESET$", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Empty_Password_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_password" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Empty_ReqObj_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "$REMOVE$", "password": "$REMOVE$", "requestTime": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=invalid_password,invalid_identifier,invalid_request, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Empty_ReqTime_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDTORESET$", "requestTime": "" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Empty_VTransactionId_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDTORESET$", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Exceeding_Limit_Identifier_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "+855556665643247654637863451123123265651223126548687832131356786783676898924", "password": "$PASSWORDTORESET$", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Exceeding_Limit_Password_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "12341234_Aa_12341234_Aa_12341234_Aa_12341234_Aa_12341234_Aa_12341234_Aa_12341234_Aa_12341234_Aa_12341234_Aa_12341234_Aa_12341234_Aa_12341234_Aa", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_password" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Expired_VTransactionId_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "7jav8tmW_gxQY-aLrWy01E6LLpkQ14jlBaB63K-wIc4", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDTORESET$", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_InvalidVal_ReqTime_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDTORESET$", "requestTime": "requestinvalid" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Invalid_Format_ReqTime_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDTORESET$", "requestTime": "2023/11/03 11:03:29.296Z" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Invalid_Num_ReqTime_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDTORESET$", "requestTime": "762537232" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Invalid_Password_Matching_Policy_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "gfhdfh", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_password" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Invalid_SpecChar_Num_Identifier_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "+85556$%8924", "password": "$PASSWORDTORESET$", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Invalid_VTransactionId_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "adsgadg", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDTORESET$", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_LessThan_Limit_Identifier_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "+855455", "password": "$PASSWORDTORESET$", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Less_Than_Min_Char_Password_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "aA_2", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_password" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Missing_CSRF_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDTORESET$", "requestTime": "$TIMESTAMP$" }, output={ }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=403, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Missing_CountryCode_Identifier_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "56768924", "password": "$PASSWORDTORESET$", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Missing_Identifier_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "$REMOVE$", "password": "$PASSWORDTORESET$", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Missing_Password_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$REMOVE$", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_password" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Missing_ReqTime_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDTORESET$", "requestTime": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Missing_VTransactionId_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$REMOVE$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDTORESET$", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_SpaceVal_Identifier_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": " ", "password": "$PASSWORDTORESET$", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_SpaceVal_Password_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": " ", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_password" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_SpaceVal_ReqTime_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDTORESET$", "requestTime": " " }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_SpaceVal_VTransactionId_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": " ", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDTORESET$", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_Valid_smoke_Pos, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$", "password": "$PASSWORDTORESET$", "requestTime": "$TIMESTAMP$" }, output={ "status":"PENDING" }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_With_AlphaNum_Identifier_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "+85556sig8924", "password": "$PASSWORDTORESET$", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_ResetPasswordNegTC_With_Space_Identifier_Neg, endPoint=/v1/signup/reset-password, role=resident, templateFields=null, input={ "verifiedTransactionID": "$ID:VerifyChallengeForResetPasswordNegTC_STransId_smoke_Pos_VTransactionID$", "identifier": "+8555 6898924", "password": "$PASSWORDTORESET$", "requestTime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/ResetPasswordNegTC/ResetPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Consent_Vid_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Consent_Vid_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Consent_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Consent_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Invalid_Scen_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Invalid_Scen_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_KycAuth_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_KycAuth_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Linked_Consent_User2_Vid_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Linked_Consent_User2_Vid_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Linked_Consent_User2_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Linked_Consent_User2_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Linked_Consent_Vid_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Linked_Consent_Vid_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Linked_Consent_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Linked_Consent_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Linked_Sce_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Linked_Sce_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Password_Auth_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Password_Auth_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Parameters_Sce2_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Parameters_Sce2_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Parameters_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Parameters_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_BindOtp_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Params_BindOtp_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_Vid_Inv_Scen_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Params_VCI_Vid_Inv_Scen_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_Vid_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Params_VCI_Vid_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Params_VCI_uin_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_uin_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Params_VCI_uin_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_WOEmail_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "phone": "9876543210", "email": "$REMOVE$", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Valid_Params_WOPhone_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "phone": "$REMOVE$", "email": "ESignet_AddIdentity_Valid_Params_WOPhone_smoke_Pos@mosip.net", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Vid_2_Generation_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Vid_2_Generation_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AddIdentity_Vid_Generation_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Vid_Generation_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","identity":{"IDSchemaVersion":0.6,"password":{"hash":"5bu7RQI_STH6R1aA73D6BwVA32XTkmS6twaIdQdwqy4","salt":"pbLZp0J36tx_h2cntyu43wZOt2NJXAIh"},"phone":"$PHONENUMBERFORIDENTITY$","registrationType":"L2","fullName":[{"language":"khm","value":"TEST_FULLNAMEkhm"}],"preferredLang":"$1STLANG$","UIN":"{{UIN}}"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicyGroup_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/group/new, role=partner, templateFields=null, input={ "desc": "$POLICYGROUPDESC$", "name": "$POLICYGROUPNAME$", "requesttime": "$TIMESTAMP$" }, output= { "id": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroup, outputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicyGroup_Misp_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/group/new, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYGROUPDESC$", "name": "$MISPPOLICYGROUPNAME$", "requesttime": "$TIMESTAMP$" }, output= { "id": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroup, outputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicyGroup_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/group/new, role=partner, templateFields=null, input={ "desc": "$RIDDEL$", "name": "$RIDDEL$", "requesttime": "$TIMESTAMP$" }, output= { "id": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroup, outputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicyGroup_in_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/group/new, role=partner, templateFields=null, input={ "desc": "$RID$", "name": "$RID$", "requesttime": "$TIMESTAMP$" }, output= { "id": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroup, outputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC$", "name": "$POLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicy, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Auth_False_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC1$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyWOPhone, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Auth_S2_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC1$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicy, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Auth_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC1$", "name": "$POLICYNAME1$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicy, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Invalid_MispPolicy_Neg, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyInvalid2, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Invalid_PolicyAuth_Neg, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyInvalid, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Invalid_PolicyGroupName_Neg, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$MISPPOLICYNAME$", "policyGroupName": "sdnvfsjf", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_019", "message": "$IGNORE$" } ] }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Invalid_PolicyType_Neg, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$MISPPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "shdb", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_023", "message": "$IGNORE$" } ] }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Misp_False_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMispFalse, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Misp_S2_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_Misp_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$MISPPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_NonAuth_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC$", "name": "$POLICYNAMENONAUTH$", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$IGNORE$", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyNonAuth, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_With_1_Policy_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_006", "message": "$IGNORE$" } ] }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp1, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy_With_2_Policy_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_006", "message": "$IGNORE$" } ] }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp2, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DefinePolicy__Invalid_Misp_Name_Neg, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$MISPPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_009", "message": "$IGNORE$" } ] }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_PublishPolicy_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": "true", "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": "true", "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_PublishPolicy_Auth_False_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_Auth_False_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": "true", "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": "true", "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_PublishPolicy_Auth_S2_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_Auth_S2_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": "true", "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": "true", "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_PublishPolicy_Misp_False_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_Misp_False_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": "true", "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "MISP", "status": "PUBLISHED", "is_Active": "true", "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_PublishPolicy_Misp_S2_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_Misp_S2_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": "true", "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "MISP", "status": "PUBLISHED", "is_Active": "true", "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_PublishPolicy_Misp_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_Misp_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": "true", "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "MISP", "status": "PUBLISHED", "is_Active": "true", "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_PublishPolicy_NonAuth_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_NonAuth_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": "true", "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": "true", "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_PublishPolicy_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_Auth_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": "true", "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": "true", "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$PARTNEREMAIL$", "organizationName": "$PARTNERID$", "partnerId": "$PARTNERID$", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$IGNORE$", "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_PartnerSelfRegistration_Auth_False_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$RANDOMPARTNEREMAIL$", "organizationName": "$RANDOMPARTNERID$", "partnerId": "$RANDOMPARTNERID$", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$IGNORE$", "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_PartnerSelfRegistration_Auth_S2_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$RANDOMPARTNEREMAIL$", "organizationName": "$RANDOMPARTNERID$", "partnerId": "$RANDOMPARTNERID$", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$IGNORE$", "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_PartnerSelfRegistration_Kyc_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$PARTNEREMAIL1$", "organizationName": "$PARTNERID1$", "partnerId": "$PARTNERID1$", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$IGNORE$", "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_PartnerSelfRegistration_Misp_False_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$RANDOMPARTNEREMAIL$", "organizationName": "$RANDOMPARTNERID$", "partnerId": "$RANDOMPARTNERID$", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$IGNORE$", "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_PartnerSelfRegistration_Misp_S2_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$RANDOMPARTNEREMAIL$", "organizationName": "$RANDOMPARTNERID$", "partnerId": "$RANDOMPARTNERID$", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$IGNORE$", "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_PartnerSelfRegistration_Misp_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$MISPPARTNEREMAIL$", "organizationName": "$MISPPARTNERID$", "partnerId": "$MISPPARTNERID$", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$IGNORE$", "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$PARTNEREMAILNONAUTH$", "organizationName": "$PARTNERIDNONAUTH$", "partnerId": "$PARTNERIDNONAUTH$", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$IGNORE$", "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "certificateData": "$CACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCACertificate_Auth_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Auth_False_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPCACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCACertificate_Auth_S2_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Auth_S2_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPCACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCACertificate_Kyc_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "certificateData": "$CACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCACertificate_Misp_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Misp_False_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPCACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCACertificate_Misp_S2_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Misp_S2_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPCACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCACertificate_Misp_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Misp_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPCACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCACertificate_NonAuth_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid_partnerId$", "certificateData": "$CACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCInterCertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "certificateData": "$INTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCInterCertificate_Auth_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Auth_False_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPINTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCInterCertificate_Auth_S2_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Auth_S2_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPINTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCInterCertificate_Kyc_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "certificateData": "$INTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCInterCertificate_Misp_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Misp_False_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPINTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCInterCertificate_Misp_S2_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Misp_S2_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPINTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCInterCertificate_Misp_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Misp_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPINTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadCInterCertificate_NonAuth_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid_partnerId$", "certificateData": "$INTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadPartnerCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$PARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { "errors": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadPartnerCert_Auth_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Auth_False_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { "errors": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadPartnerCert_Auth_S2_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Auth_S2_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { "errors": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadPartnerCert_Kyc_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$PARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { "errors": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadPartnerCert_Misp_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Misp_False_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { "errors": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadPartnerCert_Misp_S2_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Misp_S2_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { "errors": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadPartnerCert_Misp_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Misp_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { "errors": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UploadPartnerCert_NonAuth_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$PARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { "errors": "$IGNORE$" }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_updatePartnerCertificate_StatusCode_AuthDemoUrl_All_Valid_Smoke, endPoint=/v1/identity/updatePartnerCertificate, role=partner, templateFields=null, input={ "certData": "$ID:UploadPartnerCert_Misp_Valid_Smoke_sid_signedCertificateData$", "partnerType": "MISP", "partnerName": "$ID:PartnerSelfRegistration_Misp_Valid_Smoke_sid_partnerId$", "keyFileNameByPartnerName": "true", "moduleName": "esignet" }, output=200, inputTemplate=esignet/PmsIntegration/UpdatePartnerCertificate/updatePartnerCertificate, outputTemplate=esignet/PmsIntegration/UpdatePartnerCertificate/updatePartnerCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_SubmitPartnerApiKeyRequest_Kyc_Rejection_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$/policy/map, role=partner, templateFields=null, input={ "policyName": "$ID:DefinePolicy_Auth_Valid_Smoke_sid_name$", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "mappingkey": "$IGNORE$", "message": "Policy mapping request submitted successfully." }, inputTemplate=esignet/PmsIntegration/RequestAPIKey/requestApiKey, outputTemplate=esignet/PmsIntegration/RequestAPIKey/requestAPIKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$/policy/map, role=partner, templateFields=null, input={ "policyName": "$ID:DefinePolicy_All_Valid_Smoke_sid_name$", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "mappingkey": "$IGNORE$", "message": "Policy mapping request submitted successfully." }, inputTemplate=esignet/PmsIntegration/RequestAPIKey/requestApiKey, outputTemplate=esignet/PmsIntegration/RequestAPIKey/requestAPIKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_SubmitPartnerApiKeyRequest_Rejection_Auth_False_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_Auth_False_Valid_Smoke_sid_partnerId$/policy/map, role=partner, templateFields=null, input={ "policyName": "$ID:DefinePolicy_Auth_False_Valid_Smoke_sid_name$", "useCaseDescription": "Need submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "mappingkey": "$IGNORE$", "message": "Policy mapping request submitted successfully." }, inputTemplate=esignet/PmsIntegration/RequestAPIKey/requestApiKey, outputTemplate=esignet/PmsIntegration/RequestAPIKey/requestAPIKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_SubmitPartnerApiKeyRequest_Rejection_Misp_False_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_Misp_False_Valid_Smoke_sid_partnerId$/policy/map, role=partner, templateFields=null, input={ "policyName": "$ID:DefinePolicy_Misp_False_Valid_Smoke_sid_name$", "useCaseDescription": "Need submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "mappingkey": "$IGNORE$", "message": "Policy mapping request submitted successfully." }, inputTemplate=esignet/PmsIntegration/RequestAPIKey/requestApiKey, outputTemplate=esignet/PmsIntegration/RequestAPIKey/requestAPIKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_SubmitPartnerApiKeyRequest_Rejection_Misp_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_Misp_Valid_Smoke_sid_partnerId$/policy/map, role=partner, templateFields=null, input={ "policyName": "$ID:DefinePolicy_Misp_Valid_Smoke_sid_name$", "useCaseDescription": "Need submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "mappingkey": "$IGNORE$", "message": "Policy mapping request submitted successfully." }, inputTemplate=esignet/PmsIntegration/RequestAPIKey/requestApiKey, outputTemplate=esignet/PmsIntegration/RequestAPIKey/requestAPIKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_SubmitPartnerApiKeyRequest_Rejection_NonAuth_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid_partnerId$/policy/map, role=partner, templateFields=null, input={ "policyName": "$ID:DefinePolicy_NonAuth_All_Valid_Smoke_sid_name$", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "mappingkey": "$IGNORE$", "message": "Policy mapping request submitted successfully." }, inputTemplate=esignet/PmsIntegration/RequestAPIKey/requestApiKey, outputTemplate=esignet/PmsIntegration/RequestAPIKey/requestAPIKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_ApproveRejectPartnerAPIKeyReq_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKey, outputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_ApproveRejectPartnerAPIKeyReq_Auth_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_Auth_False_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKey, outputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_ApproveRejectPartnerAPIKeyReq_Kyc_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Kyc_Rejection_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKey, outputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_ApproveRejectPartnerAPIKeyReq_Misp_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_Misp_False_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKey, outputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_ApproveRejectPartnerAPIKeyReq_Misp_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_Misp_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKey, outputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_ApproveRejectPartnerAPIKeyReq_NonAuth_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_NonAuth_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKey, outputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UpdatePolicy__AfterPublished_Neg, endPoint=/v1/policymanager/policies/{policyId}, role=partner, templateFields=null, input={ "desc": "$POLICYDESC$", "name": "$POLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$" }, output= { "errors": [ { "errorCode": "PMS_POL_055" } ] }, inputTemplate=esignet/PmsIntegration/UpdatePolicy/UpdatePolicy, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_DeactivatePolicy_After_Publish_Neg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_NonAuth_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$", "status": "De-active" }, output= { "errors": [ { "errorCode": "PMS_POL_058" } ] }, inputTemplate=esignet/PmsIntegration/DeactivatePolicy/DeactivatePolicy, outputTemplate=esignet/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_GenerateMispLK_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/misps, role=partner, templateFields=null, input={ "providerId": "$ID:PartnerSelfRegistration_Misp_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=esignet/PmsIntegration/GenerateMispLK/GenerateMispLK, outputTemplate=esignet/PmsIntegration/GenerateMispLK/GenerateMispLKResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_GenerateMispLK_Misp_False_Valid_Smoke_sid, endPoint=/v1/partnermanager/misps, role=partner, templateFields=null, input={ "providerId": "$ID:PartnerSelfRegistration_Misp_False_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=esignet/PmsIntegration/GenerateMispLK/GenerateMispLK, outputTemplate=esignet/PmsIntegration/GenerateMispLK/GenerateMispLKResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_GenerateMispLK_Misp_S2_Valid_Smoke_sid, endPoint=/v1/partnermanager/misps, role=partner, templateFields=null, input={ "providerId": "$ID:PartnerSelfRegistration_Misp_S2_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=esignet/PmsIntegration/GenerateMispLK/GenerateMispLK, outputTemplate=esignet/PmsIntegration/GenerateMispLK/GenerateMispLKResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateApiKeyKyc_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$/generate/apikey, role=esignetpartnerkyc, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "policyName": "$ID:DefinePolicy_Auth_Valid_Smoke_sid_name$", "label": "ABCD" }, output={ }, inputTemplate=esignet/GenerateApiKey/GenerateApiKey, outputTemplate=esignet/GenerateApiKey/GenerateApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateApiKey_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$/generate/apikey, role=esignetpartner, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "policyName": "$ID:DefinePolicy_All_Valid_Smoke_sid_name$", "label": "ABCD" }, output={ }, inputTemplate=esignet/GenerateApiKey/GenerateApiKey, outputTemplate=esignet/GenerateApiKey/GenerateApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_Auth_False_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_Auth_False_Valid_Smoke_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_Auth_False_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/OidcClient/OIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_Auth_S2_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_Auth_S2_Valid_Smoke_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_Auth_S2_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_061", "message": "Partner policy mapping not exists." } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_InValid_Partner_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "sjsjjsjsjsjsjjs", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_058", "message": "Partner policy mapping not exists." } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_InValid_logoUri_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "djxjdjjdjdpng.cndi", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - must be a valid URL :request.logoUri" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_Misp_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_Auth_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY3$", "authPartnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/OidcClient/OIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_NonAuth_All_Valid_Smoke_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/OidcClient/OIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/OidcClient/OIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_blank_authPartnerId_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "263636gdgdg", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_058", "message": "Partner policy mapping not exists." } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_inValid_authPartnerId_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "263636gdgdg", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_058", "message": "Partner policy mapping not exists." } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_max_authPartnerId_Neg, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "17777777777777777777777777hhhhhhhhhhhhhhhh7222222222222222222222hdddddd", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_058", "message": "$IGNORE$" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_same_publickey_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_IDP_001", "message": "Client public key already exists." } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_with_empty_grantTypes_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_with_invalid_clientAuthMethods_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "????%%%$$$" }, output={ "errors": [ { "errorCode": "invalid_client_auth" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_with_invalid_grantTypes_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "ahshdbdbchhd", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_with_invalid_policy_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "ahajajaj123", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_073", "message": "Policy not exists." } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_with_maxm_char_logouri_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "dgdnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnndddddddhhhhhhhhhhhhhhhhhhhhhhhhhhhhhheeeeeehhhhhhhhhhyyyyy", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - must be a valid URL :request.logoUri" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_with_null_grantTypes_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "null", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_with_null_oidc_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - must not be blank :request.name" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_with_null_policy_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - must not be blank :request.policyId" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_CreateOIDCClient_without_redirecturi_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UpdateOIDC_Invalid_clientId_Neg, endPoint=/v1/partnermanager/oidc/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientName": "MOSIP OIDC Client", "clientId": "$DFDFF@#$", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_IDP_004" } ] }, inputTemplate=esignet/UpdateOIDC/UpdateOIDC, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_UpdateOIDC_all_Valid_Smoke, endPoint=/v1/partnermanager/oidc/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientName": "MOSIP OIDC Client", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDC/UpdateOIDC, outputTemplate=esignet/UpdateOIDC/UpdateOIDCResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_GetOidcClient_Invalid_clientId_Neg, endPoint=/v1/partnermanager/oidc/client/{client_id}, role=resident, templateFields=null, input={ "client_id": "$sjdh@#$" }, output={ "errors": [ { "errorCode": "PMS_IDP_004", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetOidcClient/GetOidcClient, outputTemplate=esignet/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Esignet_GetOidcClient_all_Valid_Smoke, endPoint=/v1/partnermanager/oidc/client/{client_id}, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$" }, output={ }, inputTemplate=esignet/GetOidcClient/GetOidcClient, outputTemplate=esignet/GetOidcClient/GetOidcClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Empty_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Empty_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: ""}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Future_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Invalid_Case_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "@#$#$##", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Invalid_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "emaeill"},{channel: "moebileee"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Invalid_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2022-11-08T06:35:53", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Missing_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Missing_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Missing_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$REMOVE$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_NR_Email_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_WOEmail_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "maskedEmail": "$IGNORE$", "maskedMobile": "$IGNORE$" }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/SendBindingOtp/SendBindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_NR_Phone_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_WOPhone_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "maskedEmail": "$IGNORE$", "maskedMobile": "$IGNORE$" }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/SendBindingOtp/SendBindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Past_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2022-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Phone_Valid_Smoke_sid, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_WOEmail_smoke_Pos_UIN$", "otpChannels": [{channel: "phone"}] }, output={ "maskedEmail": "$IGNORE$", "maskedMobile": "$IGNORE$" }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/SendBindingOtp/SendBindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Space_As_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": " ", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_Space_Sep_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "em ail"},{channel: "mobi le"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_all_Valid_Smoke_sid, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "maskedEmail": "$IGNORE$", "maskedMobile": "$IGNORE$" }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/SendBindingOtp/SendBindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendBindingOtp_uin_invalid_individual_id_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "168461341611351", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_EmptyVal_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_auth_factor_type, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_EmptyVal_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "request.challengeList[0].challenge: invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Empty_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Empty_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id", "errorMessage": "request.individualId: invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Empty_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "request.authFactorType: invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Empty_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format", "errorMessage": "request.format: unsupported_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Future_RequestTime_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "requestTime: invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Invalid_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "dfg5", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Invalid_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "gd5$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Invalid_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "GT$r5", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Invalid_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$tyhg", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "binding_auth_failed", "errorMessage": "request.individualId: invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Invalid_RequestTime_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "asdf$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "requestTime: invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Invalid_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "hy$5", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Invalid_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "hju$5", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Invalid_publicKey_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "ghj$4", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "unknown_error", "errorMessage": "JSON parse error: Cannot construct instance of `java.util.LinkedHashMap` (although at least one Creator exists): no String-argument constructor/factory method to deserialize from String value (\u0027ghj$4\u0027); nested exception is com.fasterxml.jackson.databind.exc.MismatchedInputException: Cannot construct instance of `java.util.LinkedHashMap` (although at least one Creator exists): no String-argument constructor/factory method to deserialize from String value (\u0027ghj$4\u0027)\n at [Source: (PushbackInputStream); line: 1, column: 221] (through reference chain: io.mosip.idp.core.dto.RequestWrapper[\"request\"]-\u003eio.mosip.idp.core.dto.WalletBindingRequest[\"publicKey\"])" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Missing_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "$REMOVE$", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_auth_factor_type, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Missing_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$REMOVE$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "request.challengeList[0].challenge: invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Missing_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "$REMOVE$", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Missing_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id", "errorMessage": "request.individualId: invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Missing_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "$REMOVE$", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "request.authFactorType: invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Missing_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "$REMOVE$", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format", "errorMessage": "request.format: unsupported_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Null_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "null", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "binding_auth_failed", "errorMessage": "request.individualId: invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_Null_publicKey_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "null", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_public_key", "errorMessage": "request.publicKey: invalid_public_key" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_OTP_Email_Valid_Smoke, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_WOPhone_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_WOPhone_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_WOPhone_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/WalletBinding/WalletBindingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_OTP_Phone_Valid_Smoke, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_WOEmail_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_WOEmail_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_WOEmail_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/WalletBinding/WalletBindingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_OTP_Valid_Smoke, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/WalletBinding/WalletBindingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_PastVal_RequestTime_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "requestTime: invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_SpaceVal_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": " ", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "request.challengeList[0].authFactorType: invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_auth_factor_type, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_SpaceVal_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": " ", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "request.challengeList[0].challenge: invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_SpaceVal_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": " ", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format", "errorMessage": "request.challengeList[0].format: unsupported_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_SpaceVal_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": " ", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_SpaceVal_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": " ", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WalletBinding_uin_SpaceVal_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": " ", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_EmptyClaim_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestNoClaims, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_vid_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_EmptyClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_EmptyClaim_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Consent_uin_EmptyClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_EmptyClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Consent_uin_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Consent_uin_EmptyClaim_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_EmptyClaim_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_EmptyClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Consent_uin_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_EmptyClaim_uin_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_uin_EmptyClaim_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENCONSENTEMPTYCLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Consent_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTEMPTYCLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthenticationWla_Consentuin_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_uin_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENCONSENT$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Consent_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_uin_All_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_uin_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "signature": "$CONSENTDETACHEDSIGNATURE$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Consent_uin_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_Consent_uin_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_LinkedConsent_uin_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_Consent_uin_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_LinkedConsent_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_LinkedConsent_uin_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Uin_NoBinding_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Uin_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_User2_Uin_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_Misp_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_SameClaim_NoBinding_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Uin_NoBinding_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_SameClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Uin_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_User2_Uin_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Empty_transactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Expired_transactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "4eKDB4GPk6fP8XXEDY7rktwtQF6WiwrOCehT2CwyVT0" }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Future_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Invalid_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Invalid_transactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "transactionId" }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Missing_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$REMOVE$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Missing_transactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Null_transactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "null" }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Past_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_Space_As_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": " ", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateLinkCode_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Consent_uin_SameClaim_NoBinding_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_SameClaim_NoBinding_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Consent_uin_SameClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_SameClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Consent_uin_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_User2_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Empty_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "" }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Empty_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Expired_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "8VaJtjUopVpq8Hd" }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Invalid_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$5Ng" }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Invalid_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Missing_val_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Null_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "null" }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGONRE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_RequestTime_FutureValue_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "2024-01-16T00:17:54.649Z", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_RequestTime_PastValue_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "2023-01-16T00:17:54.649Z", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_Space_Val_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": " ", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkTransaction_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_Link_Transaction_Absent_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$IGNORE$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Consent_uin_SameClaim_NoBinding_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Uin_NoBinding_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_SameClaim_NoBinding_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Consent_uin_SameClaim_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Uin_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_SameClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Consent_uin_User2_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_User2_Uin_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_User2_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Empty_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "" }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Empty_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Expired_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "y7djExbsje5uzKi" }, output={ "errors": [ { "errorCode": "response_timeout", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Expired_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "4eKDB4GPk6fP8XXEDY7rktwtQF6WiwrOCehT2CwyVT0", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "response_timeout", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Future_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Invalid_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "linkCode" }, output={ "errors": [ { "errorCode": "response_timeout", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Invalid_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Invalid_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "transactionId", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "response_timeout", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Missing_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Missing_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$REMOVE$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Missing_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Null_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "null" }, output={ "errors": [ { "errorCode": "response_timeout", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Null_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "null", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "response_timeout", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_Past_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_SpaceVal_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": " " }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_SpaceVal_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": " ", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_SpaceVal_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": " ", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetLinkStatus_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_User2_uin_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_uin_User2_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_Linked_Consent_User2_smoke_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENCONSENTUSER2$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKeyKyc_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_User2_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKeyKyc_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_User2_smoke_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Consent_User2_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTUSER2JWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "NOCAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Output Validation Exception |
io.mosip.testrig.apirig.admin.fw.util.AdminTestException: Failed at output validation
at io.mosip.testrig.apirig.testscripts.PostWithAutogenIdWithOtpGenerateForWla.test(PostWithAutogenIdWithOtpGenerateForWla.java:178)
at io.mosip.testrig.apirig.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:197)
at io.mosip.testrig.apirig.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 22 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_SameClaim_uin_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_uin_SameClaim_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENCONSENTSAMECLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Consent_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTSAMECLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthenticationWla_uin_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_Linked_Sce_smoke_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKEN$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Sce_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Sce_smoke_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Sce_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult", "maskedEmail": "$IGNORE$" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_All_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_uin_SameClaim_Pos, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_uin_SameClaim_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "email"}], "signature": "$CONSENTDETACHEDSIGNATURESAMECLAIM$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_uin_User2_Neg, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_uin_User2_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "email"}], "signature": "$CONSENTDETACHEDSIGNATUREUSER2$" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Empty_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Empty_Val_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Future_Val_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "2024-01-16T00:17:54.649Z", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Invalid_AcceptedClaims_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "$E23Teda"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Invalid_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Invalid_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "!$j6" }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Invalid_permittedAuthorizeScopes_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$", "permittedAuthorizeScopes": [{scope: "$absc34"}], "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Missing_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Null_AcceptedClaims_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "null"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Null_permittedAuthorizeScopes_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$", "permittedAuthorizeScopes": [{scope: "null"}], "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Past_Val_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "2023-01-16T00:17:54.649Z", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Space_Val_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": " ", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkedAuthorizationConsent_Space_Val_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": " " }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Consent_uin_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_User2_Uin_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_Consent_uin_User2_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Output Validation Exception |
io.mosip.testrig.apirig.admin.fw.util.AdminTestException: Response has errors
at io.mosip.testrig.apirig.authentication.fw.util.OutputValidationUtil.doJsonOutputValidation(OutputValidationUtil.java:504)
at io.mosip.testrig.apirig.authentication.fw.util.OutputValidationUtil.doJsonOutputValidation(OutputValidationUtil.java:493)
at io.mosip.testrig.apirig.authentication.fw.util.OutputValidationUtil.doJsonOutputValidation(OutputValidationUtil.java:465)
at io.mosip.testrig.apirig.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:187)
at io.mosip.testrig.apirig.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:197)
at io.mosip.testrig.apirig.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Consent_uin_SameClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Uin_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_Consent_uin_SameClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Empty_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Empty_Val_linkedCode_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "" }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Empty_Val_requestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Future_Val_requestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "2024-01-16T00:17:54.649Z", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Invalid_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$t21!", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "response_timeout", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Invalid_linkedCode_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$13hj" }, output={ "errors": [ { "errorCode": "response_timeout", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Invalid_requestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Missing_Val_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Misssing_linkedCode_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Past_Val_requestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "2023-01-16T00:17:54.649Z", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Space_Val_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": " ", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Space_Val_linkedCode_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": " " }, output={ "errors": [ { "errorCode": "invalid_link_code", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_Space_Val_requestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": " ", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_LinkAuthorizationCode_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Linked_uin_User2_all_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_Consent_uin_User2_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_Misp_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER3_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Output Validation Exception |
org.testng.SkipException: Marking testcase as skipped as required fields are empty $ID:LinkAuthorizationCode_Consent_uin_User2_all_Valid_Smoke_sid_code$
at io.mosip.testrig.apirig.admin.fw.util.AdminTestUtil.replaceKeywordWithValue(AdminTestUtil.java:2928)
at io.mosip.testrig.apirig.admin.fw.util.AdminTestUtil.replaceIdWithAutogeneratedId(AdminTestUtil.java:4138)
at io.mosip.testrig.apirig.admin.fw.util.AdminTestUtil.inputJsonKeyWordHandeler(AdminTestUtil.java:3054)
at io.mosip.testrig.apirig.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:105)
at io.mosip.testrig.apirig.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:197)
at io.mosip.testrig.apirig.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 22 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Linked_uin_SameClaim_all_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_Consent_uin_SameClaim_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Linked_uin_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_Linked_uin_IdpAccessToken_StatusCode_User2_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Linked_uin_User2_all_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Output Validation Exception |
org.testng.SkipException: Marking testcase as skipped as required fields are empty $ID:GenerateToken_Linked_uin_User2_all_Valid_Smoke_sid_access_token$
at io.mosip.testrig.apirig.admin.fw.util.AdminTestUtil.replaceKeywordWithValue(AdminTestUtil.java:2928)
at io.mosip.testrig.apirig.admin.fw.util.AdminTestUtil.replaceIdWithAutogeneratedId(AdminTestUtil.java:4138)
at io.mosip.testrig.apirig.admin.fw.util.AdminTestUtil.inputJsonKeyWordHandeler(AdminTestUtil.java:3054)
at io.mosip.testrig.apirig.admin.fw.util.AdminTestUtil.getWithPathParamAndCookie(AdminTestUtil.java:2039)
at io.mosip.testrig.apirig.admin.fw.util.AdminTestUtil.getWithPathParamAndCookie(AdminTestUtil.java:2023)
at io.mosip.testrig.apirig.testscripts.GetWithParam.test(GetWithParam.java:138)
at io.mosip.testrig.apirig.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:197)
at io.mosip.testrig.apirig.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 22 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_Linked_uin_IdpAccessToken_StatusCode_SameClaim_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Linked_uin_SameClaim_all_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_Linked_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Linked_uin_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_BioFace_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftIris_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftLittleFinger_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftMiddleFingerr_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftThumb_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_Otp_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightIndexFinger_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightIris_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightLittleFinger_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightMiddleFinger_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightRingFinger_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightThumb_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RingFinger_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_NonAuth_uin_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_Otp_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_Otp_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Parameters_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_Otp_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_Otp_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "auth_factor_mismatch" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentNewClaim, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsent, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Consent_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_Misp_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsent, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Consent_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsent, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_Otp_Claim2_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_Otp_Invalid_IndividualId_Neg, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_transactionId$", "individualId": "jndjksgl", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_Otp_Invalid_TransactionId_Neg, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "skdfsjkdfbk", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_User2_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_User2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_User2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_User2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_User2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Consent_uin_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "redirectUri": "$IGNORE$" }, inputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsent, outputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Consent_uin_Claim2_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "redirectUri": "$IGNORE$" }, inputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsent, outputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Consent_uin_Claim2_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Consent_uin_Claim2_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Consent_uin_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Consent_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_Consent_uin_IdpAccessToken_StatusCode_Claim2_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Consent_uin_Claim2_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_Consent_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Consent_uin_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_10all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_11all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_12all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_13all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_14all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_15all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_16all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_17all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_18all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_19all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_20all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_21all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_22all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_23all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_24all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_25all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_2_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_2all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_2nd_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_3all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_4all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_5all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_6all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_7all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_8all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_9all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Consent_2nd_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsent, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Diff_requestTime_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_AcrValues_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_Claims_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "claims": "" }, output={ "errors": [ { "errorCode": "unknown_error" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestEmptyClaims, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_ClientId_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_Nonce_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_Prompt_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_prompt" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_ResponseType_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_response_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_Scope_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_scope", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_State_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_claimsLocales_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_display_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_display" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Empty_redirectUri_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Exceding_Range_ClientId_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "vc0neervbsu10dfbo2vu282lt0r9hf044b1q8wm957k97wpjmrmwz6kcbpv5p9zyocksfyg41u4rpm71hhqy29sqcixg1i0ed2aaxlfd9f5wtpf3py2igi3orhttvh6vqys16nmnke9qwjjr8byjflotzyw078t1azc9rvoftuhdis40mgy9uoyzoypwdbomdkjg3v9y216y7bfpiyoenhgaudirgn432u3c2x27z23zvd094m7ug4lvid8av6jhc24j", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Exceding_Range_State_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "aa1hmnkz7ee0c1te988gw9bkos5pb4mi830uf6wrxj6hs80z07rmtwpzvjr9qjhgw8aw2rf9iljprvvxxh4y94je13gl4vr9vwaq358tnov5bh3likbef6elkqnqvnn4gu9fh1pzui2b459m0xfwjdsjlinll1s6kayk29d01i3vx1uagewcoc39ssxm4feyci06zoimd6ot3c0w3w8genv1d0hk4ni9ym1mjkwclffj5tfiglipy9sn5fyjqway9c6y", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_AcrValues_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_Claims_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestInvalidClaim, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_ClientId_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "reateOIDCClient_all_Valid_Smoke_sid_cl", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_Format_AcrValues_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp/acr:static?:code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_Nonce_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$$#@DSNsds", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_Prompt_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "abc", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_prompt", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_Range_ClientId_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": " ", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_ResponseType_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "decode", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_response_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_Scope_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "email", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_scope", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_State_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "$$@#fdhfdkl", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_claimsLocales_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "hn" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_display_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "abc", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_display", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_redirectUri_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "https://health-services.com", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_requestTime_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_AcrValues_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "$REMOVE$", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_Claims_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "claims": "$REMOVE$" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestEmptyClaims, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_ClientId_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$REMOVE$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_Nonce_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$REMOVE$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_Prompt_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "$REMOVE$", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_ResponseType_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "$REMOVE$", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_response_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_Scope_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "$REMOVE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_scope", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_State_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "$REMOVE$", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_claimsLocales_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "$REMOVE$" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_display_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "$REMOVE$", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Missing_redirectUri_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$REMOVE$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Null_AcrValues_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Null_Nonce_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "null", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Null_Prompt_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "null", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_prompt", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Null_ResponseType_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "decode", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_response_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Null_Scope_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "null", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_scope", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Null_State_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "null", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Null_claimsLocales_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "null" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Null_display_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "null", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_display", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Null_redirectUri_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "null", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Other_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SpaceValue_display_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": " ", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_display" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_WithoutSpace_AcrValues_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-codemosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_WithoutSpace_Scope_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openidemailaddressphone", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_scope", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_space_delimited_Prompt_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "select account", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_prompt", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_vid_Other_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics mosip:idp:acr:generated-code", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_NR_Email_Uin_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_WOEmail_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "maskedEmail": "$IGNORE$", "maskedMobile": "$IGNORE$" }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/SendOtp/SendOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_NR_Phone_Uin_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_WOPhone_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "maskedEmail": "$IGNORE$", "maskedMobile": "$IGNORE$" }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/SendOtp/SendOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Diff_RequestTime_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Empty_OtpChannel_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": "" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Empty_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: ""},{channel: ""}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Empty_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Empty_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Expired_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "4eKDB4GPk6fP8XXEDY7rktwtQF6WiwrOCehT2CwyVT0", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Future_RequestTime_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Invalid_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "Random1"},{channel: "Random2"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Invalid_RequestTime_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-08T06:35:53", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Invalid_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "@@#$#VGH", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Invalid_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "transactionId", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Missing_OtpChannel_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Missing_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "$REMOVE$"},{channel: "$REMOVE$"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Missing_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$REMOVE$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Missing_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Null_OtpChannel_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": "null" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Null_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "null"},{channel: "null"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Null_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "null", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_Null_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "null", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_SpaceSeparated_otpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "s m s"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_SendOtp_uin_all_Valid_Smoke, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "maskedEmail": "$IGNORE$", "maskedMobile": "$IGNORE$" }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/SendOtp/SendOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_Otp_Same_Claims, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_2nd_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_2nd_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "NOCAPTURE", "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_2_Otp_UnAuthenticated_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_Sce2_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Parameters_Sce2_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_Sce2_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-OTA-005", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_2nd_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Parameters_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Diff_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "bio", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_length, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Diff_RequestTime_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Empty_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_auth_factor_type, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Empty_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Empty_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Empty_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Expired_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "eZJZ0j3EeZJ_d9CsSakCoA0-Trbm6fOECY6J_q3dZtc", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Future_RequestTime_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Invalid_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "#$%FDF", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_length, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Invalid_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "23432", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Invalid_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "@#WE$#", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Invalid_Otp_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "113453", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-OTA-004", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Invalid_RequestTime_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Invalid_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "transactionId", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Missing_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "$REMOVE$", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_auth_factor_type, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Missing_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$REMOVE$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Missing_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$REMOVE$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_identifier", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Missing_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Null_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "null", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Null_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "null", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Null_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "null", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Null_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "null", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ], "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Other_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserIDP_uin_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Parameters_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "redirectUri": "$IGNORE$" }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/AuthorizationCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Diff_requestTime_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Empty_PermittedAuthorizeScopes_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "permittedAuthorizeScopes": [{scope: ""}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Empty_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Empty_acceptedClaims_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: ""}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Expired_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "EvOHK0ewF4AlCAVAw-aVZD1JXDNBVNtkIPGrsvxPTkw", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Future_RequestTime_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Invalid_PermittedAuthorizeScopes_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "permittedAuthorizeScopes": [{scope: "abc"}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Invalid_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "transactionId", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Invalid_acceptedClaims_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "jsdgh#4$#"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Invalid_requestTime_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-08T06:35:53", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Missing_Claims_Pos, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "$REMOVE$"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Missing_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Null_PermittedAuthorizeScopes_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "permittedAuthorizeScopes": [{scope: "null"}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Null_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "null", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_uin_Null_acceptedClaims_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "null"}] }, output={ "errors": [ { "errorCode": "invalid_transaction", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Empty_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Empty_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Empty_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Empty_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_auth_code" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Empty_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Empty_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "" }, output={ "error": "invalid_redirect_uri" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Incorrect_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn ietf params oauth client-assertion-type jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Invalid_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "sdhb$$#@", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Invalid_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "CLIENT_ASSERTION_JWK", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Invalid_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "Client_clientId", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Invalid_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "AuthorizationCode_uin_All_Valid_Smoke_sid_code", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Invalid_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "hbkd$#$@@", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Invalid_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "https://new-services.com/newprofile" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Missing_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "$REMOVE$", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Missing_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$REMOVE$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Missing_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$REMOVE$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Missing_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$REMOVE$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_auth_code" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Missing_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "$REMOVE$", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Missing_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$REMOVE$" }, output={ "error": "invalid_redirect_uri" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Null_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "null", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Null_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "null", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Null_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "null", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Null_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "null", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Null_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "null", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Null_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "null" }, output={ "error": "invalid_redirect_uri" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_SpaceFirst_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": " urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_SpaceFirst_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": " authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_SpaceLast_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer ", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_assertion_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_SpaceLast_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code ", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Used_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_transaction" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_uin_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/GenerateToken/GenerateTokenResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_uin_IdpAccessToken_StatusCode_Invalid_Token_Neg, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "eyJraWQiOiJLeVRFWVJobkQwT0F2em1RTnZsQU85STBxMjBxcjhab3p3UHI5bEhCY0NnIiwiYWxnIjoiUlMyNTYifQ.eyJzdWIiOiJQVlJtZkRwZ1pKcXZMTWZZcTZwcUItTDNZQTZXR3dYZmxiTlJpVWF6THJjIiwiYXVkIjoibW9zaXA5MTE2NjkxMTMzMDI3MDQiLCJzY29wZSI6IiIsImlzcyI6Imh0dHBzOlwvXC9hcGkucWEtMTIxLm1vc2lwLm5ldFwvdjFcL2lkcCIsImV4cCI6MTY2OTExNDE3NCwiaWF0IjoxNjY5MTEzNTc0fQ.e-cJLhWtYyg8g-T1OrEYSTgH9QX8AzaqtwEjIZsv-63hCySkTcT7n61iHd5njr7eIVuOi7K4JSBKhHhQhThlBaWrdkyihQuTyefFOTAH9UUEow8_T1MSIDun3G6-ae61mfAUZG3IvR1X2AxsFm8oor4rCZd8QLE_-yS1z8LPAg8VzRNj0th1NV_A3jsjeCySzst-saAwzAnBGPm5GncoEuo3Ftxmy2UcVO0l3ncwzebC19DDarCHRx5eNCDK6Z7oRxvPBgUKNXOwnfDO2gbjUG3fq9xCWS3ZPf-G-iMX9PRWsl2Bp7K4Ej6b_Y0nLdOHdJuwH-kKKiZMSIAMkSg4ww" }, output=401, inputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfo, outputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_uin_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfo, outputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_1stLang_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "$1STLANG$", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCI/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCI/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCI/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCI/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_1stLang_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_1stLang_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_1stLang_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_1stLang_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_1stLang_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCI/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCI/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCI/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCI/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_All_1stLang_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_1stLang_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_1stLang_all_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/VCI/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/VCI/AuthorizationCodeVCI/AuthorizationCodeVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_all_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/VCI/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/VCI/AuthorizationCodeVCI/AuthorizationCodeVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenVCI_uin_1stLang_Valid_Smoke_sid, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_VCI_uin_All_1stLang_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$CODEVERIFIER$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/VCI/GenerateTokenVCI/GenerateTokenVCI, outputTemplate=esignet/VCI/GenerateTokenVCI/GenerateTokenVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenVCI_uin_Valid_Smoke_sid, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_VCI_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$CODEVERIFIER$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/VCI/GenerateTokenVCI/GenerateTokenVCI, outputTemplate=esignet/VCI/GenerateTokenVCI/GenerateTokenVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_1stLang_all_Valid_Smoke, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_1stLang_Valid_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ }, inputTemplate=esignet/VCI/GetCredential/GetCredential, outputTemplate=esignet/VCI/GetCredential/GetCredentialResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_all_Valid_Smoke, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_Valid_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ }, inputTemplate=esignet/VCI/GetCredential/GetCredential, outputTemplate=esignet/VCI/GetCredential/GetCredentialResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Diff_Scope_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Empty_ClaimsLocales_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Empty_Code_Challenge_Method_Neg, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "" }, output={ "errors": [ { "errorCode": "invalid_pkce_challenge" } ] }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=unsupported_pkce_challenge_method,invalid_pkce_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Empty_Code_Challenge_Neg, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_pkce_challenge" } ] }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Empty_Scope_Neg, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Hash_CodeChallenge_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Invalid_ClaimsLocales_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "sdfsd", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Invalid_Code_Challenge_Method_Neg, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "sdgfdg" }, output={ "errors": [ { "errorCode": "unsupported_pkce_challenge_method" } ] }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Invalid_Scope_Neg, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid profile, mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Invalid_Val_Scope_Neg, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "hafkja", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Long_Code_Challenge_Pos, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "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", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Missing_ClaimsLocales_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "$REMOVE$", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Missing_Code_Challenge_And_Method_Neg, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$REMOVE$", "codeChallengeMethod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_pkce_challenge" } ] }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Missing_Code_Challenge_Method_Neg, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_pkce_challenge" } ] }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Missing_Code_Challenge_Neg, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$REMOVE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_pkce_challenge" } ] }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Missing_Scope_Neg, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "$REMOVE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_NegAuthCodeScen1_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_NegAuthCodeScen2_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_NegAuthCodeScen3_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_NegAuthCodeScen4_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_NegAuthCodeScen5_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_NegAuthCodeScen6_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_NegAuthCodeScen7_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_NegCredScen1_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_NegCredScen2_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_NegCredScen3_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_NegCredScen4_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_NegCredScen5_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_NegCredScen6_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_NegCredScen7_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_NegCredScen8_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_NegCredScen9_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_NegTokenScen1_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_NegTokenScen2_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_NegTokenScen3_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Null_ClaimsLocales_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "null", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Null_Code_Challenge_Method_Neg, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "null" }, output={ "errors": [ { "errorCode": "invalid_pkce_challenge" } ] }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=unsupported_pkce_challenge_method,invalid_pkce_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Null_Code_Challenge_Neg, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "null", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_Null_Scope_Neg, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "null", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_SpaceVal_ClaimsLocales_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": " ", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_SpaceVal_Code_Challenge_Method_Neg, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": " " }, output={ "errors": [ { "errorCode": "invalid_pkce_challenge" } ] }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=unsupported_pkce_challenge_method,invalid_pkce_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_SpaceVal_Code_Challenge_Neg, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": " ", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_pkce_challenge" } ] }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_VCI_uin_SpaceVal_Scope_Neg, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": " ", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/VCINegTC/OAuthDetailsRequestVCI/OAuthDetailsRequestVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_Diff_Scope_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_Diff_Scope_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_Diff_Scope_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_Diff_Scope_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_Diff_Scope_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_Hash_CodeChallenge_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_Hash_CodeChallenge_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_Hash_CodeChallenge_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_Hash_CodeChallenge_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_Hash_CodeChallenge_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_NegAuthCodeScen1_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_NegAuthCodeScen2_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen2_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen2_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen2_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen2_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_NegAuthCodeScen3_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen3_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen3_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen3_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen3_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_NegAuthCodeScen4_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen4_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen4_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen4_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen4_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_NegAuthCodeScen5_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen5_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen5_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen5_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen5_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_NegAuthCodeScen6_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen6_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen6_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen6_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen6_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_NegAuthCodeScen7_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen7_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen7_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen7_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen7_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_NegCredScen1_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_NegCredScen2_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen2_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen2_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen2_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen2_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_NegCredScen3_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen3_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen3_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen3_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen3_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_NegCredScen4_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen4_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen4_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen4_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen4_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_NegCredScen5_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen5_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen5_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen5_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen5_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_NegCredScen6_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen6_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen6_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen6_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen6_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_NegCredScen7_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen7_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen7_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen7_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen7_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_NegCredScen8_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen8_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen8_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen8_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen8_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_NegCredScen9_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen9_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen9_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen9_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen9_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_NegTokenScen1_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegTokenScen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegTokenScen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegTokenScen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegTokenScen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_NegTokenScen2_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegTokenScen2_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegTokenScen2_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegTokenScen2_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegTokenScen2_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserVCI_uin_Otp_NegTokenScen3_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegTokenScen3_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegTokenScen3_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegTokenScen3_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegTokenScen3_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCI, outputTemplate=esignet/VCINegTC/AuthenticateUserVCI/AuthenticateUserVCIResultResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_Empty_Claim_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen6_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen6_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: ""}] }, output={ "errors": [ { "errorCode": "invalid_accepted_claim" } ] }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_Empty_Scope, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen2_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen2_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: ""}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope" } ] }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_Hash_CodeChallenge_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_Hash_CodeChallenge_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_Hash_CodeChallenge_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_Invalid_Claim_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen4_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen4_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"}] }, output={ "errors": [ { "errorCode": "invalid_accepted_claim" } ] }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_Invalid_Diff_Scope, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_Diff_Scope_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_Diff_Scope_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "mosip_identity_vc_ldp"}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope" } ] }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_NegCredScen1_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen1_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_NegCredScen2_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen2_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen2_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_NegCredScen3_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen3_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen3_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_NegCredScen4_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen4_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen4_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_NegCredScen5_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen5_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen5_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_NegCredScen6_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen6_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen6_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_NegCredScen7_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen7_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen7_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_NegCredScen8_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen8_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen8_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_NegCredScen9_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen9_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegCredScen9_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_NegTokenScen1_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegTokenScen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegTokenScen1_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_NegTokenScen2_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegTokenScen2_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegTokenScen2_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_NegTokenScen3_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegTokenScen3_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegTokenScen3_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_Null_Claim_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen6_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen6_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "null"}] }, output={ "errors": [ { "errorCode": "invalid_accepted_claim" } ] }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_Null_Scope, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen2_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen2_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "null"}] }, output={ }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_SpaceVal_Scope, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen5_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen5_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: " "}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope" } ] }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_VCI_uin_spaceVal_Claim_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen7_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VCI_uin_NegAuthCodeScen7_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: " "}] }, output={ "errors": [ { "errorCode": "invalid_accepted_claim" } ] }, inputTemplate=esignet/VCINegTC/AuthorizationCodeVCI/AuthorizationCodeVCI, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenVCI_uin_Invalid_Hash_CodeChallenge, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_VCI_uin_Hash_CodeChallenge_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$CODEVERIFIER$" }, output={ "error": "pkce_failed" }, inputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCI, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenVCI_uin_NegCredScen1_Smoke_sid, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_VCI_uin_NegCredScen1_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$CODEVERIFIER$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCI, outputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenVCI_uin_NegCredScen2_Smoke_sid, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_VCI_uin_NegCredScen2_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$CODEVERIFIER$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCI, outputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenVCI_uin_NegCredScen3_Smoke_sid, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_VCI_uin_NegCredScen3_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$CODEVERIFIER$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCI, outputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenVCI_uin_NegCredScen4_Smoke_sid, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_VCI_uin_NegCredScen4_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$CODEVERIFIER$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCI, outputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenVCI_uin_NegCredScen5_Smoke_sid, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_VCI_uin_NegCredScen5_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$CODEVERIFIER$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCI, outputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenVCI_uin_NegCredScen6_Smoke_sid, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_VCI_uin_NegCredScen6_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$CODEVERIFIER$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCI, outputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenVCI_uin_NegCredScen7_Smoke_sid, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_VCI_uin_NegCredScen7_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$CODEVERIFIER$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCI, outputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenVCI_uin_NegCredScen8_Smoke_sid, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_VCI_uin_NegCredScen8_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$CODEVERIFIER$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCI, outputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenVCI_uin_NegCredScen9_Smoke_sid, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_VCI_uin_NegCredScen9_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$CODEVERIFIER$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCI, outputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenVCI_uin_NegTokenScen1_Invalid_code_verifier, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_VCI_uin_NegTokenScen1_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "sdgfhss" }, output={ "error": "pkce_failed" }, inputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCI, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenVCI_uin_NegTokenScen1_SpaceVal_code_verifier, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_VCI_uin_NegTokenScen1_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": " " }, output={ "error": "pkce_failed" }, inputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCI, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenVCI_uin_NegTokenScen2_Empty_code_verifier, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_VCI_uin_NegTokenScen2_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "" }, output={ "error": "invalid_pkce_code_verifier" }, inputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCI, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenVCI_uin_NegTokenScen2_Null_code_verifier, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_VCI_uin_NegTokenScen2_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "null" }, output={ "error": "pkce_failed" }, inputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCI, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenVCI_uin_NegTokenScen3_NoHash_code_verifier, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_VCI_uin_NegTokenScen3_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "E9Melhoa2OwvFrEMTJguCHaoeK1t8URWbuGJSstw-cM" }, output={ "error": "pkce_failed" }, inputTemplate=esignet/VCINegTC/GenerateTokenVCI/GenerateTokenVCI, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Invalid_Exp_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error":"IDA-VCI-003" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Output Validation Exception |
io.mosip.testrig.apirig.admin.fw.util.AdminTestException: Failed at otp output validation
at io.mosip.testrig.apirig.testscripts.SimplePost.test(SimplePost.java:212)
at io.mosip.testrig.apirig.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:197)
at io.mosip.testrig.apirig.testrunner.MosipTestRunner.main(MosipTestRunner.java:138)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Empty_Aud_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error":"invalid_proof" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Empty_C_nonce_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error":"invalid_proof" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Empty_Context_Cred_Def_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: ""}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error": "invalid_request" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Empty_Cred_Def_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error": "invalid_request" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredentialEmptyCredDef, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Empty_Cred_Def_Value_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: ""}, {types: ""}], "@context": [{context: ""}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error": "invalid_request" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Empty_Format_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen5_Smoke_sid_access_token$", "format": "", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error": "invalid_vc_format" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Empty_Proof_Type_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "", "proof_jwt": "$PROOFJWT$" }, output={ "error": "unsupported_proof_type" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Empty_Proof_Val_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "" }, output={ "error": "invalid_proof" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Empty_Typ_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error":"invalid_proof" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Inval1_Format_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen6_Smoke_sid_access_token$", "format": "jwt_vc_json", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error": "not_implemented" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Inval2_Format_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen7_Smoke_sid_access_token$", "format": "jwt_vc_json-ld", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error": "not_implemented" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Inval3_Format_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen8_Smoke_sid_access_token$", "format": "ldp_vc, jwt_vc_json-ld", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error": "unsupported_credential_format" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Inval_Val_Cred_Def_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "sfsdf"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error": "unsupported_credential_type" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Invalid_Aud_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error":"invalid_proof" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Invalid_C_nonce_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error":"invalid_proof" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Invalid_Iss_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error":"invalid_proof" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Invalid_JwkHeader_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error":"invalid_proof" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Invalid_Proof_Type_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "dfgdfg", "proof_jwt": "$PROOFJWT$" }, output={ "error": "unsupported_proof_type" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Invalid_Proof_Val_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "sdfs" }, output={ "error": "invalid_proof" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Invalid_Typ_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error":"invalid_proof" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Missing_Cred_Def_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "credential_definition" : "$REMOVE$", "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error": "invalid_request" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredentialNoCredDef, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Missing_Format_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen3_Smoke_sid_access_token$", "format": "$REMOVE$", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error": "invalid_vc_format" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Missing_JwkHeader_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error":"invalid_proof" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Missing_Mandate_Val1_Cred_Def_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error": "unsupported_credential_type" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Missing_Mandate_Val2_Cred_Def_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error": "unsupported_credential_type" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Missing_Proof_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}] }, output={ "error": "invalid_proof" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredentialNoProof, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Missing_Proof_Type_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "$REMOVE$", "proof_jwt": "$PROOFJWT$" }, output={ "error": "unsupported_proof_type" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Missing_Proof_Val_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$REMOVE$" }, output={ "error": "invalid_proof" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Missing_Typ_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error":"invalid_proof" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Missing_Val_Proof_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "$REMOVE$", "proof_jwt": "$REMOVE$" }, output={ "error": "unsupported_proof_type" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_NegCredScen1_Invalid_Format_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen1_Smoke_sid_access_token$", "format": "dfsfd", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error":"unsupported_credential_format" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_NegCredScen2_Invalid_Proof_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen2_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "wewrt" }, output={ "error":"invalid_proof" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_SpaceVal_Aud_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error":"invalid_proof" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_SpaceVal_C_nonce_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error":"invalid_proof" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_SpaceVal_Cred_Def_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: " "}, {types: " "}], "@context": [{context: " "}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error": "invalid_request" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_SpaceVal_Format_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen4_Smoke_sid_access_token$", "format": " ", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error": "invalid_vc_format" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_SpaceVal_Proof_Type_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": " ", "proof_jwt": "$PROOFJWT$" }, output={ "error": "unsupported_proof_type" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_SpaceVal_Typ_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOFJWT$" }, output={ "error":"invalid_proof" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredential_uin_IdpAccessToken_Space_Proof_Val_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenVCI_uin_NegCredScen9_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "MOSIPVerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": " " }, output={ "error": "invalid_proof" }, inputTemplate=esignet/VCINegTC/GetCredential/GetCredential, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_WellKnownVCI_all_Valid_Smoke_sid, endPoint=/v1/esignet/vci/.well-known/openid-credential-issuer, role=resident, templateFields=null, input={ }, output={ }, inputTemplate=esignet/VCI/WellKnownVCI/WellKnownVCI, outputTemplate=esignet/VCI/WellKnownVCI/WellKnownVCIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Password_V2_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:password", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/OAuthDetailsRequestPassword/OAuthDetailsRequestV2, outputTemplate=esignet/OAuthDetailsRequestPassword/OAuthDetailsRequestPasswordResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Password_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:password", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequestPassword/OAuthDetailsRequestPassword, outputTemplate=esignet/OAuthDetailsRequestPassword/OAuthDetailsRequestPasswordResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Password_uin_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:password", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequestPassword/OAuthDetailsRequestPassword, outputTemplate=esignet/OAuthDetailsRequestPassword/OAuthDetailsRequestPasswordResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPassword_V2_Valid_Smoke, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_V2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_V2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:GenerateChallenge_STransId_Valid_smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$" }, output={ "consentAction": "CAPTURE" }, inputTemplate=esignet/AuthenticateUserPassword/AuthenticateUserPassword, outputTemplate=esignet/AuthenticateUserPassword/AuthenticateUserPasswordResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPassword_Valid_Smoke, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:GenerateChallenge_STransId_Valid_smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$" }, output={ "consentAction": "CAPTURE" }, inputTemplate=esignet/AuthenticateUserPassword/AuthenticateUserPassword, outputTemplate=esignet/AuthenticateUserPassword/AuthenticateUserPasswordResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPassword_uin_Valid_Smoke, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_uin_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_uin_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Password_Auth_smoke_Pos_UIN$", "authFactorType" : "PWD", "challenge" : "$PASSWORDFORAUTHENTICATION$" }, output={ "consentAction": "CAPTURE" }, inputTemplate=esignet/AuthenticateUserPassword/AuthenticateUserPassword, outputTemplate=esignet/AuthenticateUserPassword/AuthenticateUserPasswordResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Password_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "redirectUri": "$IGNORE$" }, inputTemplate=esignet/AuthorizationCodePassword/AuthorizationCodePassword, outputTemplate=esignet/AuthorizationCodePassword/AuthorizationCodePasswordResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Password_V2_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_V2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_V2_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "redirectUri": "$IGNORE$" }, inputTemplate=esignet/AuthorizationCodePassword/AuthorizationCodePassword, outputTemplate=esignet/AuthorizationCodePassword/AuthorizationCodePasswordResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_Password_uin_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_uin_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_uin_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "redirectUri": "$IGNORE$" }, inputTemplate=esignet/AuthorizationCodePassword/AuthorizationCodePassword, outputTemplate=esignet/AuthorizationCodePassword/AuthorizationCodePasswordResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Password_V2_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Password_V2_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$CODEVERIFIER$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/GenerateTokenPassword/GenerateTokenV2, outputTemplate=esignet/GenerateTokenPassword/GenerateTokenPasswordResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Password_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Password_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/GenerateTokenPassword/GenerateTokenPassword, outputTemplate=esignet/GenerateTokenPassword/GenerateTokenPasswordResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateToken_Password_uin_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Password_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/GenerateTokenPassword/GenerateTokenPassword, outputTemplate=esignet/GenerateTokenPassword/GenerateTokenPasswordResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_IdpAccessToken_StatusCode_Password_V2_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Password_V2_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/GetOidcUserInfoPassword/GetOidcUserInfoPassword, outputTemplate=esignet/GetOidcUserInfoPassword/GetOidcUserInfoPasswordResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_IdpAccessToken_StatusCode_Password_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Password_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/GetOidcUserInfoPassword/GetOidcUserInfoPassword, outputTemplate=esignet/GetOidcUserInfoPassword/GetOidcUserInfoPasswordResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetOidcUserInfo_IdpAccessToken_StatusCode_Password_uin_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Password_uin_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/GetOidcUserInfoPassword/GetOidcUserInfoPassword, outputTemplate=esignet/GetOidcUserInfoPassword/GetOidcUserInfoPasswordResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:password", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequestPasswordNegTC/OAuthDetailsRequestPasswordNegTC, outputTemplate=esignet/OAuthDetailsRequestPasswordNegTC/OAuthDetailsRequestPasswordNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Password_NegTC_Scen2_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:password", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequestPasswordNegTC/OAuthDetailsRequestPasswordNegTC, outputTemplate=esignet/OAuthDetailsRequestPasswordNegTC/OAuthDetailsRequestPasswordNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_Password_NegTC_Scen3_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:password", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequestPasswordNegTC/OAuthDetailsRequestPasswordNegTC, outputTemplate=esignet/OAuthDetailsRequestPasswordNegTC/OAuthDetailsRequestPasswordNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_All_Zero_IndividualId_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "+00000000000@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_Empty_ChallengeList_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "$REMOVE$", "challenge" : "$REMOVE$", "format": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format,invalid_auth_factor_type,invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_Empty_ChallengeList_and_format_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$REMOVE$", "format": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format,invalid_auth_factor_type,invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_Empty_IndividualId_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_Empty_ReqTime_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_Empty_TransactionId_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_Expired_TransactionId_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "hHdtT70A6ne3r392Qsw3raRQKkksNrSCx-Z1ZzFaSm8", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_Invalid_Num_ReqTime_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "762537232", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_Invalid_ReqTime_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "requestinvalid", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_Invalid_TransactionId_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "sdgbsgljkj", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_Missing_ChallengeList_Array_and_IndividualId_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$REMOVE$", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_no_of_challenges" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTCWOChallengeList, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_no_of_challenges,invalid_identifier, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_Missing_ChallengeList_Array_and_TransactionId_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTCWOChallengeList, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_Missing_IndividualId_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$REMOVE$", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_Missing_ReqTime_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$REMOVE$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_Missing_TransactionId_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_SpaceInVal_IndividualId_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "+ 855 737289558@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_SpaceVal_IndividualId_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": " ", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_SpaceVal_ReqTime_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": " ", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_SpaceVal_TransactionId_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": " ", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_SpecialChar_IndividualId_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "+855737^8:@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_StartsWith_Zero_IndividualId_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "+855000289558@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_UnRegistered_IndividualId_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "+855737289558@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "IDA-MLC-018" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_Valid_Smoke, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "consentAction": "CAPTURE" }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_Without_ChallengeList_Array_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_no_of_challenges" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTCWOChallengeList, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_Without_CountryCode_IndividualId_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "737289558@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_Without_RequestBody_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTCEmptyRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_withOUT_format_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format,invalid_auth_factor_type,invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_with_Empty_format_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format,invalid_auth_factor_type,invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_with_Empty_string_format_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": " " }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format,invalid_auth_factor_type,invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_with_authFactorType_password_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PASSWORD", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_with_challenge_doesnot_match_regex_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "11111fdsd$%%VDSF1", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "IDA-PSD-001" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format,invalid_auth_factor_type,invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_with_empty_authFactorType_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format,invalid_auth_factor_type,invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_with_empty_challenge_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format,invalid_auth_factor_type,invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_with_empty_string_authFactorType_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : " ", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format,invalid_auth_factor_type,invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_with_empty_string_challenge_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : " ", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format,invalid_auth_factor_type,invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_with_invalid_authFactorType_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "abc@s", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_with_invalid_challenge_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "hghja6757", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "IDA-PSD-001" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_with_invalid_format_in_challenegelist_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen2_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen2_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge": "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-sfad" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format,invalid_auth_factor_type,invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_with_only_challenge_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "$REMOVE$", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format,invalid_auth_factor_type,invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_with_only_format_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "$REMOVE$", "challenge" : "$REMOVE$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format,invalid_auth_factor_type,invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_with_unregistered_challenge_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "hghja6757", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "IDA-PSD-001" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_with_unsupported_format_in_challenegelist_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen3_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen3_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge": "$RESETPASSWORDFORAUTHENTICATION$", "format": "cwt" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format,invalid_auth_factor_type,invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_without_authFactorType_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "$REMOVE$", "challenge" : "$RESETPASSWORDFORAUTHENTICATION$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format,invalid_auth_factor_type,invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserPasswordNegTC_without_challenge_Neg, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Password_NegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$ID:VerifyChallengeNegTC_STransId_Valid_Smoke_Pos_PHONE$@phone", "authFactorType" : "PWD", "challenge" : "$REMOVE$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/AuthenticateUserPasswordNegTC/AuthenticateUserPasswordNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=invalid_challenge_format,invalid_auth_factor_type,invalid_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_2_Same_RelyParty_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/CreateOIDCClient/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Diff_RequestTime_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Empty_authContextRefs, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: ""}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Empty_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "" }, output={ "errors": [ { "errorCode": "invalid_client_auth", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Empty_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Exceding_Range_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1kbjjl7srfy3veqp88g2u1nn2do7za1svus4hdfj8nr2xe4jlxa54n9okvcv1kbjjl7srfy3veqp88g2u1nn2do7za1svus4hdfj", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Exceding_Range_ClientName_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1", "clientName": "vc0neervbsu10dfbo2vu282lt0r9hf044b1q8wm957k97wpjmrmwz6kcbpv5p9zyocksfyg41u4rpm71hhqy29sqcixg1i0ed2aaxlfd9f5wtpf3py2igi3orhttvh6vqys16nmnke9qwjjr8byjflotzyw078t1azc9rvoftuhdis40mgy9uoyzoypwdbomdkjg3v9y216y7bfpiyoenhgaudirgn432u3c2x27z23zvd094m7ug4lvid8av6jhc24j", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_Exceding_Range_logoUri_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1", "clientName": "MOSIP OIDC CLIENT", "logoUri": "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", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_uri", "errorMessage": "request.logoUri: invalid_uri" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_Exceding_Range_relyingPartyId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1", "clientName": "MOSIP OIDC CLIENT", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "8nr2xe4jlxa54n9okvcv1kbjjl7srfy3veqp88g2u1nn2do7za1svus4hdfj8nr2xe4jlxa54n9okvcv1kbjjl7srfy3veqp88g2u1nn2do7za1svus4hdfj", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_rp_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_Range_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_Range_ClientName_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1", "clientName": "", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_Range_logoUri_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1", "clientName": "MOSIP OIDC CLIENT", "logoUri": "", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_Range_relyingPartyId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1", "clientName": "MOSIP OIDC CLIENT", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_rp_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_RequestTime_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_SpaceFirst_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": " 8nr2xe4jlxa54n9okvcv12", "clientName": "MOSIP OIDC CLIENT", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_SpaceLast_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv12 ", "clientName": "MOSIP OIDC CLIENT", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_SpaceMiddle_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4j lxa54n9okvcv12", "clientName": "MOSIP OIDC CLIENT", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_UserClaims, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RA5315$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "xyz", "userClaims2": "fd@gh.com", "userClaims3": "$REMOVE$", "userClaims4": "$REMOVE$", "userClaims5": "$REMOVE$", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_claim", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_authContextRefs, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "invalid_acr"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "$$#@@A" }, output={ "errors": [ { "errorCode": "invalid_client_auth", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "$$@###$", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Invalid_publicKey, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RA5315$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_public_key", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClientInvPublicKey, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Missing_authContextRefs, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "$REMOVE$"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Missing_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_client_auth", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Missing_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "$REMOVE$", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Missing_redirectUris, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "2222222dddfggf", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$REMOVE$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Null_authContextRefs, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "null"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Null_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "null" }, output={ "errors": [ { "errorCode": "invalid_client_auth", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_Null_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "null", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_StatusCode_Diff_Token_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=idrepo, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output=403, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_StatusCode_Invalid_Token_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output=401, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/CreateOIDCClient/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_2_all_Valid_Smoke, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_2_Same_RelyParty_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Diff_RequestTime_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Empty_authContextRefs_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: ""}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Empty_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "" }, output={ "errors": [ { "errorCode": "invalid_client_auth", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Empty_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Empty_redirectUris_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Exceding_Range_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "8nr2xe4jlxa54n9okvcv1kbjjl7srfy3veqp88g2u1nn2do7za1svus4hdfj", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Exceding_Range_ClientName, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "vc0neervbsu10dfbo2vu282lt0r9hf044b1q8wm957k97wpjmrmwz6kcbpv5p9zyocksfyg41u4rpm71hhqy29sqcixg1i0ed2aaxlfd9f5wtpf3py2igi3orhttvh6vqys16nmnke9qwjjr8byjflotzyw078t1azc9rvoftuhdis40mgy9uoyzoypwdbomdkjg3v9y216y7bfpiyoenhgaudirgn432u3c2x27z23zvd094m7ug4lvid8av6jhc24j", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Exceding_Range_logoUri_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "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", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_Range_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": " ", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_Range_ClientName, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_Range_logoUri_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_RequestTime_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_authContextRefs_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "invalid_acr"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "$$#@@A" }, output={ "errors": [ { "errorCode": "invalid_client_auth", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_clientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "@#DDSS$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "$$@###$", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_status_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "@$$##%", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_status", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Invalid_userClaims_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "xyz", "userClaims2": "fd@gh.com", "userClaims3": "$REMOVE$", "userClaims4": "$REMOVE$", "userClaims5": "$REMOVE$", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_claim", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Missing_authContextRefs_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "$REMOVE$"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Missing_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_client_auth", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Missing_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "$REMOVE$", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Missing_redirectUris_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$REMOVE$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Null_authContextRefs_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "null"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Null_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "null" }, output={ "errors": [ { "errorCode": "invalid_client_auth", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_Null_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "null", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type", "errorMessage": "$IGNORE$" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_StatusCode_Diff_Token_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=idrepo, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output=403, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_StatusCode_Invalid_Token_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output=401, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClient_all_Valid_Smoke, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClientV2_Invalid_clientNameLang_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$V2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "" }, output={ "errors": [ { "errorCode": "invalid_client_name_value" } ] }, inputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClientV2_Invalid_langCode_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$V2S2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "abc", "clientNameLang": "MOSIP OIDC Client" }, output={ "errors": [ { "errorCode": "invalid_language_code" } ] }, inputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClientV2_Invalid_langCode_Size_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$V2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "mhsdfsfd", "clientNameLang": "MOSIP OIDC Client" }, output={ "errors": [ { "errorCode": "invalid_language_code" } ] }, inputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClientV2_Missing_ClientNamelangMap_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$V2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name" } ] }, inputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClientWOClientLangMap, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClientV2_Missing_ClientNamelangMap_Value_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$V2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name" } ] }, inputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClientWOClientLangMapValue, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClientV2_all_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$V2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClient, outputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClientV2_Invalid_clientNameLang_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "" }, output={ "errors": [ { "errorCode": "invalid_client_name_value" } ] }, inputTemplate=esignet/UpdateOIDCClientV2/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClientV2_Invalid_langCode_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "abc", "clientNameLang": "MOSIP OIDC Client" }, output={ "errors": [ { "errorCode": "invalid_language_code" } ] }, inputTemplate=esignet/UpdateOIDCClientV2/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClientV2_Invalid_langCode_Size_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "sdfsdgsdg", "clientNameLang": "MOSIP OIDC Client" }, output={ "errors": [ { "errorCode": "invalid_language_code" } ] }, inputTemplate=esignet/UpdateOIDCClientV2/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClientV2_Missing_ClientNamelangMap_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name" } ] }, inputTemplate=esignet/UpdateOIDCClientV2/UpdateOIDCClientWOClientNameMap, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClientV2_Missing_ClientNamelangMap_Value_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name" } ] }, inputTemplate=esignet/UpdateOIDCClientV2/UpdateOIDCClientWOClientNameMapValue, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_UpdateOIDCClientV2_all_Valid_Smoke, endPoint=/v1/esignet/client-mgmt/oauth-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClientV2/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_V2_uin_1stLang_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "$1STLANG$", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/OAuthDetailsRequestV2/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequestV2/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_V2_uin_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/OAuthDetailsRequestV2/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequestV2/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$V2S3", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$OIDCJWKKEY4$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"},{acrValues: "mosip:idp:acr:knowledge"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=esignet/SunBirdRC/CreateOIDCClientV2SunBirdRC/CreateOIDCClientV2SunBirdRC, outputTemplate=esignet/SunBirdRC/CreateOIDCClientV2SunBirdRC/CreateOIDCClientV2SunBirdRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRC_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRC/OAuthDetailsRequestSunBirdRC/OAuthDetailsRequestSunBirdRC, outputTemplate=esignet/SunBirdRC/OAuthDetailsRequestSunBirdRC/OAuthDetailsRequestSunBirdRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRC_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdRC/AuthenticateUserSunBirdRC/AuthenticateUserSunBirdRC, outputTemplate=esignet/SunBirdRC/AuthenticateUserSunBirdRC/AuthenticateUserSunBirdRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdRC_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRC_all_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "sunbird_rc_insurance_vc_ldp"}] }, output={ }, inputTemplate=esignet/SunBirdRC/AuthorizationCodeSunBirdRC/AuthorizationCodeSunBirdRC, outputTemplate=esignet/SunBirdRC/AuthorizationCodeSunBirdRC/AuthorizationCodeSunBirdRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenSunBirdRC_Valid_Smoke_sid, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdRC_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$CODEVERIFIER$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/SunBirdRC/GenerateTokenSunBirdRC/GenerateTokenSunBirdRC, outputTemplate=esignet/SunBirdRC/GenerateTokenSunBirdRC/GenerateTokenSunBirdRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredentialSunBirdRC_IdpAccessToken_all_Valid_Smoke, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenSunBirdRC_Valid_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOF_JWT_2$" }, output={ }, inputTemplate=esignet/SunBirdRC/GetCredentialSunBirdRC/GetCredentialSunBirdRC, outputTemplate=esignet/SunBirdRC/GetCredentialSunBirdRC/GetCredentialSunBirdRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRCNegTC_Scen1_AuthCode_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRCNegTC_Scen1_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRCNegTC_Scen2_AuthCode_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRCNegTC_Scen2_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRCNegTC_Scen3_AuthCode_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRCNegTC_Scen3_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRCNegTC_Scen4_AuthCode_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRCNegTC_Scen4_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRCNegTC_Scen5_AuthCode_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRCNegTC_Scen5_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRCNegTC_Scen6_AuthCode_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRCNegTC_Scen6_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRCNegTC_Scen7_AuthCode_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRCNegTC_Scen8_AuthCode_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTC/OAuthDetailsRequestSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRC_With_only_challenge_method, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$REMOVE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_pkce_challenge" } ] }, inputTemplate=esignet/SunBirdRC/OAuthDetailsRequestSunBirdRC/OAuthDetailsRequestSunBirdRC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRC_With_only_code_challenge_with_scope, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_pkce_challenge" } ] }, inputTemplate=esignet/SunBirdRC/OAuthDetailsRequestSunBirdRC/OAuthDetailsRequestSunBirdRC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRC_all_Valid_Smoke_with_other_acrs, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRC/OAuthDetailsRequestSunBirdRC/OAuthDetailsRequestSunBirdRC, outputTemplate=esignet/SunBirdRC/OAuthDetailsRequestSunBirdRC/OAuthDetailsRequestSunBirdRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRC_with_empty_challenege_data, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": " ", "codeChallengeMethod": " " }, output={ "errors": [ { "errorCode": "unsupported_pkce_challenge_method" } ] }, inputTemplate=esignet/SunBirdRC/OAuthDetailsRequestSunBirdRC/OAuthDetailsRequestSunBirdRC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=unsupported_pkce_challenge_method,invalid_pkce_challenge, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRC_with_invalid_challenege_method, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "@64gdbbjn" }, output={ "errors": [ { "errorCode": "unsupported_pkce_challenge_method" } ] }, inputTemplate=esignet/SunBirdRC/OAuthDetailsRequestSunBirdRC/OAuthDetailsRequestSunBirdRC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRC_with_invalid_scope_data, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "anbcsh123", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/SunBirdRC/OAuthDetailsRequestSunBirdRC/OAuthDetailsRequestSunBirdRC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRC_with_lengthy_codeChallenege_data, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "9sJ3SSa1AfcYwqieyegdbdbdbdbhey373664gfgfbcbcbcncjccudhdyye7eyeggcbc374hfgdfdsbs98645g4gvgvv", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRC/OAuthDetailsRequestSunBirdRC/OAuthDetailsRequestSunBirdRC, outputTemplate=esignet/SunBirdRC/OAuthDetailsRequestSunBirdRC/OAuthDetailsRequestSunBirdRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRC_with_opeind_scope_data, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRC/OAuthDetailsRequestSunBirdRC/OAuthDetailsRequestSunBirdRC, outputTemplate=esignet/SunBirdRC/OAuthDetailsRequestSunBirdRC/OAuthDetailsRequestSunBirdRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRC_with_openid_profile_sunbird_data, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "openid profile sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/SunBirdRC/OAuthDetailsRequestSunBirdRC/OAuthDetailsRequestSunBirdRC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRC_with_random_codeChallenege_data, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "9sJ3SSa1AfcYwqi", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdRC/OAuthDetailsRequestSunBirdRC/OAuthDetailsRequestSunBirdRC, outputTemplate=esignet/SunBirdRC/OAuthDetailsRequestSunBirdRC/OAuthDetailsRequestSunBirdRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRC_without_codeChallenege_and_with_sunbirdrc_scope, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$REMOVE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_pkce_challenge" } ] }, inputTemplate=esignet/SunBirdRC/OAuthDetailsRequestSunBirdRC/OAuthDetailsRequestSunBirdRC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRC_without_scope, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "$REMOVE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/SunBirdRC/OAuthDetailsRequestSunBirdRC/OAuthDetailsRequestSunBirdRC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdRC_without_scope_data, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "scope": "", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "973eieljzng", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/SunBirdRC/OAuthDetailsRequestSunBirdRC/OAuthDetailsRequestSunBirdRC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Diff_Format1_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen3_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen3_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Diff_Format2_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen4_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen4_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Diff_Format3_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen5_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen5_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "number" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Diff_Format4_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen6_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen6_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "jwt" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Empty_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Empty_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Empty_Format_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Empty_PolicyNum_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Empty_TransactionID_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "sgsfdg", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Expired_TransactionID_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "LIqWka8p3F4ID2Z2X4Dnxqf57ixUZyHxGGrDe7R96p4", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Invalid_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "ads", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Invalid_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "eyJmdWxsTmFtZSI6IkthaWYgZGFmZHNmZCIsImRvYiI6IjIwMDAtMDctMjYifQ==", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "auth_failed" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Invalid_Encoded_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "eyJmdWxsTmFtZSI6IkthaWYgZGFmZHNmZCIsImRvYiI6IjIwMDAtMDctMjYifQ==", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "auth_failed" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Invalid_Format_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen2_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen2_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "sdfgffgs" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Invalid_PolicyNum_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "5adsf1", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "auth_failed" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Invalid_TransactionID_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "sgsfdg", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Missing_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "$REMOVE$", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Missing_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$REMOVE$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Missing_Format_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Missing_PolicyNum_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$REMOVE$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Missing_TransactionID_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Null_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "null", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Null_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "null", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Null_Format_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen1_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen1_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "null" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Null_PolicyNum_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "null", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "auth_failed" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Other_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "OTP", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Random_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "sfdgsfhsgjrtjysngfbfsnbsgfjhsgj", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Scen1_AuthCode_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen1_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen1_AuthCode_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Scen2_AuthCode_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen2_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen2_AuthCode_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Scen3_AuthCode_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen3_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen3_AuthCode_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Scen4_AuthCode_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen4_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen4_AuthCode_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Scen5_AuthCode_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen5_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen5_AuthCode_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Scen6_AuthCode_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen6_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen6_AuthCode_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Scen7_AuthCode_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen7_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen7_AuthCode_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Scen8_AuthCode_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen8_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen8_AuthCode_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_SpaceVal_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : " ", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_SpaceVal_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : " ", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_SpaceVal_Format_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": " " }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_SpaceVal_PolicyNum_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": " ", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Used_TransactionID_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthenticateUserSunBirdRCNegTC_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDRC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/AuthenticateUserSunBirdRCNegTC/AuthenticateUserSunBirdRCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdRCNegTC_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_all_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "sunbird_rc_insurance_vc_ldp"}] }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdRCNegTC_Comma_Separated_Scope_Pos, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen3_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen3_AuthCode_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "sunbird_rc_insurance_vc_ldp,openid profile"}] }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdRCNegTC_Diff_Scope2_Pos, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen2_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen2_AuthCode_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "openid profile"}, {scope: "sunbird_rc_insurance_vc_ldp"}] }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdRCNegTC_Diff_Scope_Pos, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen1_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen1_AuthCode_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "openid profile"}] }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdRCNegTC_Empty_Scope_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen5_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen5_AuthCode_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: ""}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdRCNegTC_Invalid_Scope_Pos, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen7_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen7_AuthCode_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "sgsdfhg"}] }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdRCNegTC_Missing_Scope_Pos, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen4_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen4_AuthCode_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "$REMOVE$"}] }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdRCNegTC_Null_Scope_Pos, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen8_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen8_AuthCode_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "null"}] }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTCRCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_AuthorizationCode_SunBirdRCNegTC_SpaceVal_Scope_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen6_AuthCode_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdRCNegTC_Scen6_AuthCode_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: " "}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope" } ] }, inputTemplate=esignet/SunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC/AuthorizationCodeSunBirdRCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenSunBirdRCNegTC_Empty_Code_Verifier_Neg, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdRCNegTC_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "" }, output={ "error": "invalid_pkce_code_verifier" }, inputTemplate=esignet/SunBirdRCNegTC/GenerateTokenSunBirdRCNegTC/GenerateTokenSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenSunBirdRCNegTC_Invalid_Code_Verifier_Neg, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdRCNegTC_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "sdfgsfdhsfdhgfshfgsdgs" }, output={ "error": "pkce_failed" }, inputTemplate=esignet/SunBirdRCNegTC/GenerateTokenSunBirdRCNegTC/GenerateTokenSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenSunBirdRCNegTC_Missing_Code_Verifier_Neg, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdRCNegTC_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$REMOVE$" }, output={ "error": "invalid_pkce_code_verifier" }, inputTemplate=esignet/SunBirdRCNegTC/GenerateTokenSunBirdRCNegTC/GenerateTokenSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenSunBirdRCNegTC_Null_Code_Verifier_Neg, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdRCNegTC_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "null" }, output={ "error": "pkce_failed" }, inputTemplate=esignet/SunBirdRCNegTC/GenerateTokenSunBirdRCNegTC/GenerateTokenSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenSunBirdRCNegTC_SpaceVal_Code_Verifier_Neg, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdRCNegTC_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": " " }, output={ "error": "pkce_failed" }, inputTemplate=esignet/SunBirdRCNegTC/GenerateTokenSunBirdRCNegTC/GenerateTokenSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GenerateTokenSunBirdRCNegTC_Valid_Smoke_sid, endPoint=/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdRCNegTC_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$CODEVERIFIER$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/SunBirdRCNegTC/GenerateTokenSunBirdRCNegTC/GenerateTokenSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/GenerateTokenSunBirdRCNegTC/GenerateTokenSunBirdRCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredentialSunBirdRCNegTC_IdpAccessToken_Empty_Credential_Def_Type1_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenSunBirdRCNegTC_Valid_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: ""}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOF_JWT_2$" }, output={ "error": "invalid_request" }, inputTemplate=esignet/SunBirdRCNegTC/GetCredentialSunBirdRCNegTC/GetCredentialSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredentialSunBirdRCNegTC_IdpAccessToken_Empty_Credential_Def_Type2_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenSunBirdRCNegTC_Valid_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: ""}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOF_JWT_2$" }, output={ "error": "invalid_request" }, inputTemplate=esignet/SunBirdRCNegTC/GetCredentialSunBirdRCNegTC/GetCredentialSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredentialSunBirdRCNegTC_IdpAccessToken_Empty_Credential_Def_Types_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenSunBirdRCNegTC_Valid_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: ""}, {types: ""}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOF_JWT_2$" }, output={ "error": "invalid_request" }, inputTemplate=esignet/SunBirdRCNegTC/GetCredentialSunBirdRCNegTC/GetCredentialSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredentialSunBirdRCNegTC_IdpAccessToken_Invalid_Credential_Def_Type1_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenSunBirdRCNegTC_Valid_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "asfadf"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOF_JWT_2$" }, output={ "error": "unsupported_credential_type" }, inputTemplate=esignet/SunBirdRCNegTC/GetCredentialSunBirdRCNegTC/GetCredentialSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredentialSunBirdRCNegTC_IdpAccessToken_Invalid_Credential_Def_Type2_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenSunBirdRCNegTC_Valid_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "asfadf"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOF_JWT_2$" }, output={ "error": "unsupported_credential_type" }, inputTemplate=esignet/SunBirdRCNegTC/GetCredentialSunBirdRCNegTC/GetCredentialSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredentialSunBirdRCNegTC_IdpAccessToken_Invalid_Credential_Def_Types_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenSunBirdRCNegTC_Valid_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "asfadf"}, {types: "asgfdga"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOF_JWT_2$" }, output={ "error": "unsupported_credential_type" }, inputTemplate=esignet/SunBirdRCNegTC/GetCredentialSunBirdRCNegTC/GetCredentialSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredentialSunBirdRCNegTC_IdpAccessToken_Missing_Credential_Def_Type1_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenSunBirdRCNegTC_Valid_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "$REMOVE$"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOF_JWT_2$" }, output={ "error": "unsupported_credential_type" }, inputTemplate=esignet/SunBirdRCNegTC/GetCredentialSunBirdRCNegTC/GetCredentialSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredentialSunBirdRCNegTC_IdpAccessToken_Missing_Credential_Def_Type2_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenSunBirdRCNegTC_Valid_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "$REMOVE$"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOF_JWT_2$" }, output={ "error": "unsupported_credential_type" }, inputTemplate=esignet/SunBirdRCNegTC/GetCredentialSunBirdRCNegTC/GetCredentialSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredentialSunBirdRCNegTC_IdpAccessToken_Missing_Credential_Def_Types_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenSunBirdRCNegTC_Valid_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "$REMOVE$"}, {types: "$REMOVE$"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOF_JWT_2$" }, output={ "error": "invalid_request" }, inputTemplate=esignet/SunBirdRCNegTC/GetCredentialSunBirdRCNegTC/GetCredentialSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredentialSunBirdRCNegTC_IdpAccessToken_Null_Credential_Def_Type1_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenSunBirdRCNegTC_Valid_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "null"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOF_JWT_2$" }, output={ "error": "unsupported_credential_type" }, inputTemplate=esignet/SunBirdRCNegTC/GetCredentialSunBirdRCNegTC/GetCredentialSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredentialSunBirdRCNegTC_IdpAccessToken_Null_Credential_Def_Type2_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenSunBirdRCNegTC_Valid_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "null"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOF_JWT_2$" }, output={ "error": "unsupported_credential_type" }, inputTemplate=esignet/SunBirdRCNegTC/GetCredentialSunBirdRCNegTC/GetCredentialSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredentialSunBirdRCNegTC_IdpAccessToken_Null_Credential_Def_Types_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenSunBirdRCNegTC_Valid_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "null"}, {types: "null"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOF_JWT_2$" }, output={ "error": "unsupported_credential_type" }, inputTemplate=esignet/SunBirdRCNegTC/GetCredentialSunBirdRCNegTC/GetCredentialSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredentialSunBirdRCNegTC_IdpAccessToken_SpaceVal_Credential_Def_Type1_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenSunBirdRCNegTC_Valid_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: " "}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOF_JWT_2$" }, output={ "error": "invalid_request" }, inputTemplate=esignet/SunBirdRCNegTC/GetCredentialSunBirdRCNegTC/GetCredentialSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredentialSunBirdRCNegTC_IdpAccessToken_SpaceVal_Credential_Def_Type2_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenSunBirdRCNegTC_Valid_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: " "}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOF_JWT_2$" }, output={ "error": "invalid_request" }, inputTemplate=esignet/SunBirdRCNegTC/GetCredentialSunBirdRCNegTC/GetCredentialSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredentialSunBirdRCNegTC_IdpAccessToken_SpaceVal_Credential_Def_Types_Neg, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenSunBirdRCNegTC_Valid_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: " "}, {types: " "}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOF_JWT_2$" }, output={ "error": "invalid_request" }, inputTemplate=esignet/SunBirdRCNegTC/GetCredentialSunBirdRCNegTC/GetCredentialSunBirdRCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=ESignet_GetCredentialSunBirdRCNegTC_IdpAccessToken_all_Valid_Smoke, endPoint=/v1/esignet/vci/credential, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClientV2SunBirdRC_all_Valid_Smoke_sid_clientId$", "idpAccessToken": "$ID:GenerateTokenSunBirdRCNegTC_Valid_Smoke_sid_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", "proof_jwt": "$PROOF_JWT_2$" }, output={ }, inputTemplate=esignet/SunBirdRCNegTC/GetCredentialSunBirdRCNegTC/GetCredentialSunBirdRCNegTC, outputTemplate=esignet/SunBirdRCNegTC/GetCredentialSunBirdRCNegTC/GetCredentialSunBirdRCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null |
| Messages |